Static task
static1
Behavioral task
behavioral1
Sample
560d0bd9a8c21f72695bbd8fc66eb3d0_JaffaCakes118.dll
Resource
win7-20240903-en
General
-
Target
560d0bd9a8c21f72695bbd8fc66eb3d0_JaffaCakes118
-
Size
113KB
-
MD5
560d0bd9a8c21f72695bbd8fc66eb3d0
-
SHA1
4ecad2404274a46356a7449a01e761d344fdcfa2
-
SHA256
826210119090be68fe285ce0eb8e2416fc2fc2a804dc65f67578aa826167a1b2
-
SHA512
8a8b161dbc152edd94518f95ae868c41565e30cba75ca923dedf0a9fdbb91470cb23a9271aa671a4e2839f41de6a2299b8d88a0d2ea993a92b23869c99afc7fa
-
SSDEEP
1536:owAWaviLk6F52yLO1Yu/I9jIg0kE/FgMG+SUyMjg8A/oOh+:nmqY6FUyLsYuw98dFrc23AQOh
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 560d0bd9a8c21f72695bbd8fc66eb3d0_JaffaCakes118
Files
-
560d0bd9a8c21f72695bbd8fc66eb3d0_JaffaCakes118.dll windows:5 windows x86 arch:x86
059f3861fa9d895eb93063febc7e3f1d
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
ExitProcess
ExpandEnvironmentStringsW
FreeLibrary
GetCommandLineW
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetLastError
GetModuleFileNameA
GetProcAddress
GetStartupInfoA
GetSystemTimeAsFileTime
GetTickCount
LoadLibraryA
LoadLibraryW
QueryPerformanceCounter
TerminateProcess
UnhandledExceptionFilter
WritePrivateProfileStringW
VirtualAllocEx
LoadLibraryExA
user32
wsprintfW
LoadIconA
LoadCursorW
msvcrt
_XcptFilter
__getmainargs
__p__commode
__p__fmode
__set_app_type
__setusermatherr
_acmdln
_adjust_fdiv
_c_exit
_cexit
_controlfp
_except_handler3
_exit
_initterm
exit
free
malloc
sprintf
Sections
.text Size: 22KB - Virtual size: 21KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 68KB - Virtual size: 67KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.Rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 19KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ