Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_156f6e1bd370d98053af4cad26c6db48bd4d89d729b9cfc64e10095e2ddfca63.dll
Resource
win7-20240729-en
General
-
Target
JaffaCakes118_156f6e1bd370d98053af4cad26c6db48bd4d89d729b9cfc64e10095e2ddfca63
-
Size
160KB
-
MD5
fc290ac3e2df17335c5c7577791fe04d
-
SHA1
6c12dcbf6695a7e7294687fbceb8eccc0ba62ba6
-
SHA256
156f6e1bd370d98053af4cad26c6db48bd4d89d729b9cfc64e10095e2ddfca63
-
SHA512
87c8ce7f37df4d95c9c6a47f35cd0f46eaa7fa548b2044a2f4b8631bd943c7d9995937716b1e39e4c4d9b5909bad2826556fb46cf8a36d0a2d5b7532d70dc3b8
-
SSDEEP
3072:JgOn8cnYCTZouiOyPmE7Zsantih3+0wuFiD3xJaTw1tHr:b8mnT7Fmsans1+0Hw7/t
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource JaffaCakes118_156f6e1bd370d98053af4cad26c6db48bd4d89d729b9cfc64e10095e2ddfca63
Files
-
JaffaCakes118_156f6e1bd370d98053af4cad26c6db48bd4d89d729b9cfc64e10095e2ddfca63.dll windows:5 windows x86 arch:x86
358e7b546fc120707f212d62466c1efc
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
clusapi
ClusterEnum
kernel32
GetProfileSectionW
LoadLibraryW
GetModuleHandleW
LoadLibraryExW
OutputDebugStringA
CloseHandle
GetProfileSectionA
OpenSemaphoreW
advapi32
RegOverridePredefKey
rasapi32
RasGetConnectionStatistics
ole32
CreatePointerMoniker
CreateStreamOnHGlobal
user32
TranslateMessage
opengl32
glTexSubImage1D
Sections
.text Size: 140KB - Virtual size: 141KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.pdata Size: 6KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 592B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ