Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_e7dc5fc84e8a494c5f4ad77bf6a51f2cb3dc6ce873e27f2cd281461de38588e5.dll
Resource
win7-20240708-en
General
-
Target
JaffaCakes118_e7dc5fc84e8a494c5f4ad77bf6a51f2cb3dc6ce873e27f2cd281461de38588e5
-
Size
160KB
-
MD5
cf5b8074c87560659d0e157710bb93af
-
SHA1
e9d33b64681e2e09ff1e74c2e698cc5ade70806a
-
SHA256
e7dc5fc84e8a494c5f4ad77bf6a51f2cb3dc6ce873e27f2cd281461de38588e5
-
SHA512
efb9665f27c95bf6851d65ddde5f0876992fba67c83b1a1478623080e0fe1aed0cc0d09033723966cc817bd7ec8c5d593bc950d542849280d3e21626619eb6fd
-
SSDEEP
3072:w6On8cnYCTZouiOyPmE7Zsantih3+0wuFiD3xJaTw1tHr:o8mnT7Fmsans1+0Hw7/t
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource JaffaCakes118_e7dc5fc84e8a494c5f4ad77bf6a51f2cb3dc6ce873e27f2cd281461de38588e5
Files
-
JaffaCakes118_e7dc5fc84e8a494c5f4ad77bf6a51f2cb3dc6ce873e27f2cd281461de38588e5.dll windows:5 windows x86 arch:x86
358e7b546fc120707f212d62466c1efc
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
clusapi
ClusterEnum
kernel32
GetProfileSectionW
LoadLibraryW
GetModuleHandleW
LoadLibraryExW
OutputDebugStringA
CloseHandle
GetProfileSectionA
OpenSemaphoreW
advapi32
RegOverridePredefKey
rasapi32
RasGetConnectionStatistics
ole32
CreatePointerMoniker
CreateStreamOnHGlobal
user32
TranslateMessage
opengl32
glTexSubImage1D
Sections
.text Size: 140KB - Virtual size: 141KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.pdata Size: 6KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 832B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ