Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_bd7b8a662cf17bfcb1a7fe4286c5f405938809a2c2c3feb3866af5fa80de1396.dll
Resource
win7-20240708-en
General
-
Target
JaffaCakes118_bd7b8a662cf17bfcb1a7fe4286c5f405938809a2c2c3feb3866af5fa80de1396
-
Size
160KB
-
MD5
9240ba9d4223cec4e109d7374e2e1ac6
-
SHA1
0c1de6d06677f9b5142ee8ef841082a28163e610
-
SHA256
bd7b8a662cf17bfcb1a7fe4286c5f405938809a2c2c3feb3866af5fa80de1396
-
SHA512
07ac3a13b90cabb8595cb50998eb8f398eb99989bdaf27c82cfd98164e00ab453e621ee5ff975d037262d2a1c203ec23eba7284f5ae6f182bb94f49a457b5d6a
-
SSDEEP
3072:+kOn8cnYCTZouiOyPmE7Zsantih3+0wuFiD3xJaTw1tHr:s8mnT7Fmsans1+0Hw7/t
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource JaffaCakes118_bd7b8a662cf17bfcb1a7fe4286c5f405938809a2c2c3feb3866af5fa80de1396
Files
-
JaffaCakes118_bd7b8a662cf17bfcb1a7fe4286c5f405938809a2c2c3feb3866af5fa80de1396.dll windows:5 windows x86 arch:x86
358e7b546fc120707f212d62466c1efc
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
clusapi
ClusterEnum
kernel32
GetProfileSectionW
LoadLibraryW
GetModuleHandleW
LoadLibraryExW
OutputDebugStringA
CloseHandle
GetProfileSectionA
OpenSemaphoreW
advapi32
RegOverridePredefKey
rasapi32
RasGetConnectionStatistics
ole32
CreatePointerMoniker
CreateStreamOnHGlobal
user32
TranslateMessage
opengl32
glTexSubImage1D
Sections
.text Size: 140KB - Virtual size: 143KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.pdata Size: 6KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 592B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ