Static task
static1
Behavioral task
behavioral1
Sample
52ee0716295b78cc57a70e4aa67514fc_JaffaCakes118.dll
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
52ee0716295b78cc57a70e4aa67514fc_JaffaCakes118.dll
Resource
win10v2004-20241007-en
General
-
Target
52ee0716295b78cc57a70e4aa67514fc_JaffaCakes118
-
Size
237KB
-
MD5
52ee0716295b78cc57a70e4aa67514fc
-
SHA1
df0e84af847ab14d35bb59f3c4d98cacd8b1ec66
-
SHA256
e72bd156b6df7e43756527850f175e4d7e4ae08bef5d747c2fc41a564355669e
-
SHA512
02f099ba4e1ba2ede7e5c791712a34ff8018de1494415edb88fe56eb6808c1e9e76dad21f414dd63601da0e73700dc137cccadb314284a7263c361628c4de741
-
SSDEEP
3072:fhv+G0K/6nyCkdEt7bvaUOAfYVLaTh/NRY48+iya7RPCkxSeZ3XPEQNkaS:f1AyCkdEt7bvaUd+LSX+yaN6kRZPEZa
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 52ee0716295b78cc57a70e4aa67514fc_JaffaCakes118
Files
-
52ee0716295b78cc57a70e4aa67514fc_JaffaCakes118.dll windows:4 windows x86 arch:x86
7dbff0788f942392fae78a5a58158aed
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
shell32
SHGetDesktopFolder
Shell_NotifyIconA
DragQueryFileA
SHGetSpecialFolderLocation
SHGetFolderPathA
user32
LoadStringA
SendMessageW
InsertMenuA
SetClipboardData
GetParent
GetWindowDC
kernel32
VirtualAllocEx
LoadLibraryA
ExitProcess
LocalAlloc
GetProcAddress
IsBadReadPtr
VirtualAlloc
GetVersionExA
ExitThread
LoadLibraryExA
GetModuleHandleW
GetCommandLineW
GetModuleHandleA
lstrlenA
shlwapi
SHQueryInfoKeyA
SHEnumValueA
PathIsDirectoryA
SHDeleteValueA
PathIsContentTypeA
SHStrDupA
SHGetValueA
SHDeleteKeyA
PathGetCharTypeA
PathFileExistsA
version
VerInstallFileA
msvcrt
sqrt
time
wcsncmp
swprintf
atan
memcpy
tolower
comctl32
ImageList_Read
ImageList_GetBkColor
ImageList_DragShowNolock
ImageList_Write
ImageList_Draw
ImageList_DrawEx
ImageList_Add
ImageList_Destroy
ImageList_DragShowNolock
ole32
CreateStreamOnHGlobal
CoCreateFreeThreadedMarshaler
advapi32
RegLoadKeyA
RegDeleteValueA
RegEnumKeyA
GetUserNameA
RegDeleteValueA
RegEnumKeyA
comdlg32
FindTextA
gdi32
CreateBrushIndirect
SetPixel
GetRgnBox
BitBlt
SetTextColor
GetDIBits
GetPaletteEntries
CreatePalette
CreatePenIndirect
LineTo
GetObjectA
GetDIBColorTable
GetPixel
CreateDIBitmap
GetDIBits
CreateDIBSection
oleaut32
SysAllocStringLen
SysFreeString
Sections
.text Size: 61KB - Virtual size: 61KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ddata Size: 1024B - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bdata Size: 156KB - Virtual size: 156KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.gdata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 996B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ