Static task
static1
Behavioral task
behavioral1
Sample
54a6b0626a32437c10d1d89722853ec3_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
54a6b0626a32437c10d1d89722853ec3_JaffaCakes118.dll
Resource
win10v2004-20241007-en
General
-
Target
54a6b0626a32437c10d1d89722853ec3_JaffaCakes118
-
Size
267KB
-
MD5
54a6b0626a32437c10d1d89722853ec3
-
SHA1
3baf5ec3ffe9106f7d025890f6cc162c3245d410
-
SHA256
e525b8f77d97cd9a1c6a8a5fa0f4e1ab2044b4e1d300b4944d23b8bd909f0756
-
SHA512
0f0d0b46dcca8a4af3b3751ca317cfe6845eda6c261430d071923f4695d96465e70e3c7bf0b4dfda0fdcd3102077a27789d8daa27cf58d326859159c2b038729
-
SSDEEP
6144:pDNpCFWQv1UibnIqks0W9q7kIHQG1MbCsgcjqnH:L8F51TbIqKW9yTMbm
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 54a6b0626a32437c10d1d89722853ec3_JaffaCakes118
Files
-
54a6b0626a32437c10d1d89722853ec3_JaffaCakes118.dll windows:4 windows x86 arch:x86
b4cdc306ba2df83c79ecf7ec7f7d6d55
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
user32
LoadBitmapA
IsCharUpperA
GetWindowTextA
EndMenu
DispatchMessageA
CreateIconFromResourceEx
kernel32
LeaveCriticalSection
lstrcmpiA
lstrcmpA
VirtualFree
TlsSetValue
lstrlenA
CompareStringA
EnumResourceLanguagesA
EnumResourceTypesA
ExitThread
FlushFileBuffers
FreeResource
GetFileSize
GetLastError
GetPrivateProfileStringA
GetStartupInfoA
GetSystemTimeAsFileTime
GetTimeFormatA
TlsAlloc
LoadLibraryA
OpenFile
OpenFileMappingA
SetEndOfFile
SleepEx
lstrcpyA
oleaut32
OleLoadPicturePath
SafeArrayAccessData
SysReAllocString
ClearCustData
Sections
.text Size: 18KB - Virtual size: 404KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 243KB - Virtual size: 244KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ