Static task
static1
Behavioral task
behavioral1
Sample
50372beae3fae41642f9f1518576a304f0a2e330e06045987d6e35cb74163acc.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
50372beae3fae41642f9f1518576a304f0a2e330e06045987d6e35cb74163acc.exe
Resource
win10v2004-20240508-en
General
-
Target
349f045c28e410eda485b2f7d7113af7_JaffaCakes118
-
Size
192KB
-
MD5
349f045c28e410eda485b2f7d7113af7
-
SHA1
467b887e5e6681e703742e1836063dc510e1e3f8
-
SHA256
253cdc37cbc0eab1c2e5510c2b88914d66b5f3b080c36e25ac0c4cb354000f65
-
SHA512
9d573ffe64fabc1d075f9361685d260a207b6bf2050fa26bbd97feaa6dc8b2265c2b77a765726d2e8a311e3c5b9e440e4af5ac0b5b5ff31ba8e003cdc01e2d8f
-
SSDEEP
6144:EAYs4owJhr0m3hPllnXyrCZoVsuUL+1PI2iUnahVB8:2sgJhH3hPBMU61qUnsg
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/50372beae3fae41642f9f1518576a304f0a2e330e06045987d6e35cb74163acc
Files
-
349f045c28e410eda485b2f7d7113af7_JaffaCakes118.zip
Password: infected
-
50372beae3fae41642f9f1518576a304f0a2e330e06045987d6e35cb74163acc.exe windows:4 windows x86 arch:x86
a4ffe9cd60352f1329b9d3a89764d029
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualFree
SetUnhandledExceptionFilter
VirtualAlloc
HeapCreate
HeapDestroy
GetStringTypeA
IsBadReadPtr
IsBadWritePtr
GetFileType
GetStdHandle
GetStringTypeW
SetStdHandle
GetLocaleInfoA
GetLocaleInfoW
CompareStringA
CompareStringW
SetEnvironmentVariableA
IsBadCodePtr
FreeEnvironmentStringsW
GetFileAttributesA
MulDiv
lstrcpyA
GlobalGetAtomNameA
GlobalAddAtomA
LocalFree
lstrcpynA
MultiByteToWideChar
WideCharToMultiByte
lstrlenA
InterlockedDecrement
InterlockedIncrement
lstrcatA
GetCurrentThreadId
GlobalLock
GlobalUnlock
GlobalFree
LockResource
FindResourceA
LoadResource
GetWindowsDirectoryA
GlobalMemoryStatus
CopyFileA
GetProfileStringA
SetHandleCount
GetEnvironmentStringsW
UnhandledExceptionFilter
GetEnvironmentStrings
FreeEnvironmentStringsA
HeapReAlloc
HeapSize
GetACP
GetTimeZoneInformation
GetLocalTime
GetSystemTime
RaiseException
HeapFree
HeapAlloc
GetModuleHandleA
GetCommandLineA
GetStartupInfoA
TerminateProcess
ExitProcess
GetCPInfo
RtlUnwind
GetOEMCP
LocalLock
SetErrorMode
SystemTimeToFileTime
LocalUnlock
GetModuleFileNameA
LocalFileTimeToFileTime
GetFileSize
GetStringTypeExA
GetShortPathNameA
GetThreadLocale
FindClose
GetVolumeInformationA
FindFirstFileA
SetEndOfFile
DeleteFileA
MoveFileA
FlushFileBuffers
UnlockFile
LockFile
ReadFile
SetFilePointer
WriteFile
DuplicateHandle
CreateFileA
GetCurrentProcess
GetPrivateProfileStringA
GetCurrentDirectoryA
WritePrivateProfileStringA
GetProcessVersion
GetPrivateProfileIntA
GetVersion
LocalReAlloc
GetProcAddress
TlsGetValue
GlobalReAlloc
TlsSetValue
EnterCriticalSection
GlobalHandle
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
TlsAlloc
GetLastError
LocalAlloc
SizeofResource
LoadLibraryA
SetLastError
GlobalFlags
GetFullPathNameA
FreeLibrary
GetDiskFreeSpaceA
SetFileTime
GetTempFileNameA
GetFileTime
lstrcmpiA
WinExec
CloseHandle
GlobalAlloc
GlobalDeleteAtom
GetCurrentThread
lstrcmpA
FileTimeToLocalFileTime
FileTimeToSystemTime
LCMapStringA
LCMapStringW
user32
SetParent
IntersectRect
PtInRect
ClientToScreen
GetDC
IsRectEmpty
ReleaseDC
OffsetRect
IsZoomed
BringWindowToTop
IsIconic
InvalidateRect
UnpackDDElParam
ReuseDDElParam
SetMenu
LoadMenuA
GetDesktopWindow
SetCursor
ReleaseCapture
TranslateAcceleratorA
LoadAcceleratorsA
SetRectEmpty
CharUpperA
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
SetWindowTextA
IsDialogMessageA
SetDlgItemTextA
LoadIconA
PostMessageA
UpdateWindow
SendDlgItemMessageA
SystemParametersInfoA
MapWindowPoints
GetSysColor
DispatchMessageA
PeekMessageA
GetFocus
SetFocus
AdjustWindowRectEx
DeferWindowPos
BeginDeferWindowPos
CopyRect
EndDeferWindowPos
AppendMenuA
ScrollWindow
GetScrollInfo
SetScrollInfo
ShowScrollBar
GetScrollRange
SetScrollRange
GetScrollPos
SetScrollPos
GetTopWindow
IsChild
GetCapture
WinHelpA
wsprintfA
GetClassInfoA
RegisterClassA
GetMenuItemCount
GetSubMenu
GetMenuItemID
GetMenu
GetWindowTextLengthA
GetWindowTextA
GetDlgCtrlID
GetKeyState
DefWindowProcA
CreateWindowExA
SetWindowsHookExA
SetPropA
CallNextHookEx
UnhookWindowsHookEx
GetLastActivePopup
GetForegroundWindow
SetForegroundWindow
GetPropA
RemovePropA
GetTabbedTextExtentA
DestroyIcon
GetMenuStringA
InsertMenuA
LockWindowUpdate
GetDCEx
InvertRect
SetCapture
InflateRect
GetSysColorBrush
CallWindowProcA
GetMessageTime
GetMessagePos
GetWindow
GetWindowRect
SetWindowLongA
SetWindowPos
RegisterWindowMessageA
GetNextDlgTabItem
EndDialog
GetActiveWindow
SetActiveWindow
IsWindow
GetSystemMetrics
CreateDialogIndirectParamA
MessageBeep
IsClipboardFormatAvailable
FillRect
GetClassNameA
EqualRect
LoadCursorA
DestroyWindow
GetParent
GetWindowLongA
GetDlgItem
IsWindowEnabled
GetClientRect
SetTimer
SendMessageA
EnableWindow
MessageBoxExA
DestroyCursor
LoadStringA
GetMessageA
TranslateMessage
ValidateRect
MessageBoxA
ShowOwnedPopups
PostQuitMessage
GrayStringA
DrawTextA
TabbedTextOutA
EndPaint
BeginPaint
GetWindowDC
SetRect
GetCursorPos
WindowFromPoint
KillTimer
GetSystemMenu
DeleteMenu
IsWindowVisible
ScreenToClient
ShowWindow
DestroyMenu
UnregisterClassA
HideCaret
ShowCaret
ExcludeUpdateRgn
DrawFocusRect
DefDlgProcA
CharNextA
IsWindowUnicode
gdi32
SetTextColor
GetObjectA
CreateBitmap
GetTextMetricsA
DeleteDC
StretchDIBits
CreateCompatibleDC
CreateCompatibleBitmap
StartDocA
SaveDC
RestoreDC
GetStockObject
SetPolyFillMode
SetROP2
SetBkMode
SetMapMode
SetViewportOrgEx
SetStretchBltMode
SetViewportExtEx
ScaleViewportExtEx
OffsetViewportOrgEx
SetWindowExtEx
SetWindowOrgEx
GetClipBox
SelectClipRgn
ScaleWindowExtEx
IntersectClipRect
ExcludeClipRect
GetTextExtentPointA
LineTo
MoveToEx
SetTextAlign
GetCurrentPositionEx
DeleteObject
CreateRectRgn
GetDeviceCaps
GetWindowExtEx
CreatePen
GetViewportExtEx
CreateSolidBrush
PtVisible
CreatePatternBrush
TextOutA
ExtTextOutA
RectVisible
PatBlt
Rectangle
Escape
GetViewportOrgEx
AbortDoc
DPtoLP
EndPage
StartPage
EndDoc
CreateDCA
CreateRectRgnIndirect
SetAbortProc
BitBlt
CreateFontIndirectA
SetRectRgn
LPtoDP
CombineRgn
GetBkColor
GetTextColor
GetNearestColor
GetPolyFillMode
GetTextAlign
GetStretchBltMode
GetROP2
GetTextFaceA
GetBkMode
GetWindowOrgEx
GetCharWidthA
CreateDIBitmap
SetBkColor
SelectObject
comdlg32
GetFileTitleA
FindTextA
GetOpenFileNameA
ReplaceTextA
CommDlgExtendedError
GetSaveFileNameA
PrintDlgA
winspool.drv
DocumentPropertiesA
ClosePrinter
OpenPrinterA
advapi32
RegDeleteValueA
RegQueryValueA
RegCloseKey
RegEnumKeyA
RegOpenKeyA
RegDeleteKeyA
SetFileSecurityA
GetFileSecurityA
RegCreateKeyExA
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
RegCreateKeyA
RegSetValueA
shell32
SHGetFileInfoA
DragQueryFileA
DragFinish
ExtractIconA
comctl32
ord17
ImageList_Destroy
ole32
CoDisconnectObject
oleaut32
SysAllocString
SysStringLen
SysFreeString
SysAllocStringLen
VariantChangeType
VariantClear
VariantCopy
SysAllocStringByteLen
LoadTypeLi
Sections
.text Size: 269KB - Virtual size: 268KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 62KB - Virtual size: 61KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 18KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 35KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 36KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ