Behavioral task
behavioral1
Sample
f5f93b480a4ca583092b496be670cab9_JaffaCakes118.exe
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
f5f93b480a4ca583092b496be670cab9_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f5f93b480a4ca583092b496be670cab9_JaffaCakes118
-
Size
689KB
-
MD5
f5f93b480a4ca583092b496be670cab9
-
SHA1
7599346d4289e30e379d7b66d56bb85bb1d70c7b
-
SHA256
62d0df3e2034c38c55163ea9a5e6c972416a39a3dac53fecea54fec272301fdc
-
SHA512
8de0eb7c0923b3623ddf23af15d87dcbb516c621667a141de3695a72ae5a0b09b3a995a3ad9a6cd417c6d165c6efbbb1dc25a5a89d7c15561ec9db6885892786
-
SSDEEP
12288:oHaUzb/8R/oQQXew/1boTID5jra/W9K4RHzFOMMW3SMyvnuZIGiYBXlwFwQy5A:oHa2w/YOw/Vo0D5jra/hUFOKn+dy5A
Malware Config
Signatures
-
Panda Stealer payload 1 IoCs
resource yara_rule sample family_pandastealer -
Pandastealer family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f5f93b480a4ca583092b496be670cab9_JaffaCakes118
Files
-
f5f93b480a4ca583092b496be670cab9_JaffaCakes118.exe windows:6 windows x86 arch:x86
9db7d21743f36aad6f49979b57158e77
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
EnterCriticalSection
GetCurrentProcess
WriteFile
LeaveCriticalSection
SetFilePointer
InitializeCriticalSectionEx
UnmapViewOfFile
GetModuleHandleA
HeapSize
MultiByteToWideChar
GetFileInformationByHandle
CopyFileA
GetLastError
CreateFileA
FileTimeToSystemTime
LoadLibraryA
LockResource
HeapReAlloc
CloseHandle
RaiseException
FindResourceExW
LoadResource
FindResourceW
HeapAlloc
GetLocalTime
DecodePointer
HeapDestroy
GetProcAddress
CreateFileMappingA
GetFileSize
DeleteCriticalSection
GetProcessHeap
SystemTimeToFileTime
FreeLibrary
WideCharToMultiByte
HeapFree
MapViewOfFile
GetTickCount
IsWow64Process
AreFileApisANSI
GetFullPathNameW
LockFile
InitializeCriticalSection
GetFullPathNameA
SetEndOfFile
GetTempPathW
CreateFileW
GetFileAttributesW
GetCurrentThreadId
Sleep
GetTempPathA
GetFileAttributesA
GetVersionExA
DeleteFileA
DeleteFileW
LoadLibraryW
UnlockFile
LockFileEx
GetCurrentProcessId
GetSystemTimeAsFileTime
GetSystemTime
FormatMessageA
QueryPerformanceCounter
FlushFileBuffers
SetStdHandle
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetOEMCP
GetACP
IsValidCodePage
SizeofResource
GetModuleFileNameA
CreateProcessA
ReadFile
ReadConsoleW
GetTimeZoneInformation
GetFileType
GetFileSizeEx
GetConsoleMode
GetConsoleCP
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetTimeFormatW
WriteConsoleW
GetDateFormatW
GetCommandLineW
GetCommandLineA
GetStdHandle
GetModuleFileNameW
GetModuleHandleExW
ExitProcess
QueryPerformanceFrequency
VirtualQuery
VirtualProtect
VirtualAlloc
GetCurrentDirectoryW
CreateDirectoryW
FindClose
FindFirstFileExW
FindNextFileW
GetFileAttributesExW
RemoveDirectoryW
SetFilePointerEx
SetLastError
GetModuleHandleW
CopyFileW
LocalFree
GetStringTypeW
EncodePointer
InitializeCriticalSectionAndSpinCount
CreateEventW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
CompareStringW
LCMapStringW
GetLocaleInfoW
GetCPInfo
IsDebuggerPresent
OutputDebugStringW
SetEvent
ResetEvent
WaitForSingleObjectEx
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
InitializeSListHead
TerminateProcess
RtlUnwind
LoadLibraryExW
GetSystemInfo
user32
GetDC
GetSystemMetrics
ReleaseDC
GetDesktopWindow
gdi32
DeleteObject
GetObjectA
shlwapi
PathFindExtensionW
PathFindExtensionA
gdiplus
GdipSaveImageToFile
GdipCreateBitmapFromScan0
GdipGetImageEncodersSize
GdipDisposeImage
GdipGetImageEncoders
GdiplusStartup
GdipCreateBitmapFromHBITMAP
GdiplusShutdown
wininet
HttpEndRequestA
HttpSendRequestExA
InternetOpenA
InternetCloseHandle
HttpOpenRequestA
HttpSendRequestA
InternetConnectA
InternetReadFile
Sections
.text Size: 546KB - Virtual size: 545KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 107KB - Virtual size: 107KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 27KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ