LoxmtYt
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_d6ebf5e21894bfa1dc1bda833129e5e634f9d60cb482d6c87e02fc50673481f8.dll
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_d6ebf5e21894bfa1dc1bda833129e5e634f9d60cb482d6c87e02fc50673481f8
-
Size
161KB
-
MD5
1aa45f5e292e88daa20a26512f44f669
-
SHA1
065bd377aaa4572f55f5d28f1b590b31d777c8ff
-
SHA256
d6ebf5e21894bfa1dc1bda833129e5e634f9d60cb482d6c87e02fc50673481f8
-
SHA512
09300433baff077624caa92fc8a9fc8c2a7839582413c619b2137a82fb799ff38625313b42f0dd0c9e03c463bb50d407ba39214cf754e05642b0ee67ac0bc232
-
SSDEEP
3072:hm63mpMBf4M8+pwhukvhU7fWaX/77/DZgTmbg+MGaFplA33VBrUZCx3:sa/jkvhSlP/7bg8aFnA3brH
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource JaffaCakes118_d6ebf5e21894bfa1dc1bda833129e5e634f9d60cb482d6c87e02fc50673481f8
Files
-
JaffaCakes118_d6ebf5e21894bfa1dc1bda833129e5e634f9d60cb482d6c87e02fc50673481f8.dll windows:5 windows x86 arch:x86
e6aa540e1f4085a198af68216e7e3577
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
advapi32
RegOverridePredefKey
kernel32
GetProfileSectionA
GetProfileSectionW
CreateFileW
CloseHandle
OutputDebugStringA
LoadLibraryExW
OpenSemaphoreW
LoadLibraryW
msvcrt
memset
rasapi32
RasGetConnectionStatistics
user32
TranslateMessage
opengl32
glTexSubImage1D
clusapi
ClusterEnum
ole32
CreateStreamOnHGlobal
CreatePointerMoniker
Exports
Exports
Sections
.text Size: 141KB - Virtual size: 143KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.pdata Size: 6KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 928B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 608B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ