Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_2e61a6a1f390e5d8a400ccc928fe19f0f76a2108bfa7698cf4efd0653f767a7c.dll
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_2e61a6a1f390e5d8a400ccc928fe19f0f76a2108bfa7698cf4efd0653f767a7c
-
Size
160KB
-
MD5
60234a2683fd75a0cf9b6a2a8e8c6dcb
-
SHA1
cf32fd875f16b7ba6690c703921dc6aaed6bf238
-
SHA256
2e61a6a1f390e5d8a400ccc928fe19f0f76a2108bfa7698cf4efd0653f767a7c
-
SHA512
587fb70683bb7d17bebae7f3bac957e3a324bac897ac9f8d4fbd5b571a3daa6a41cb5b92b835f67774b93206146ca5b926a12d5e589a3f0cf22bf29698b41c08
-
SSDEEP
3072:HOOn8cnYCTZouiOyPmE7Zsantih3+0wuFiD3xJaTw1tHr:D8mnT7Fmsans1+0Hw7/t
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource JaffaCakes118_2e61a6a1f390e5d8a400ccc928fe19f0f76a2108bfa7698cf4efd0653f767a7c
Files
-
JaffaCakes118_2e61a6a1f390e5d8a400ccc928fe19f0f76a2108bfa7698cf4efd0653f767a7c.dll windows:5 windows x86 arch:x86
358e7b546fc120707f212d62466c1efc
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
clusapi
ClusterEnum
kernel32
GetProfileSectionW
LoadLibraryW
GetModuleHandleW
LoadLibraryExW
OutputDebugStringA
CloseHandle
GetProfileSectionA
OpenSemaphoreW
advapi32
RegOverridePredefKey
rasapi32
RasGetConnectionStatistics
ole32
CreatePointerMoniker
CreateStreamOnHGlobal
user32
TranslateMessage
opengl32
glTexSubImage1D
Sections
.text Size: 140KB - Virtual size: 143KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.pdata Size: 6KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 832B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ