Behavioral task
behavioral1
Sample
60ad68e8bc5d9b1c96446ecde4f32bea_JaffaCakes118.exe
Resource
win7-20231129-en
General
-
Target
60ad68e8bc5d9b1c96446ecde4f32bea_JaffaCakes118
-
Size
525KB
-
MD5
60ad68e8bc5d9b1c96446ecde4f32bea
-
SHA1
d6a43de37a1e7d13860c552783693466c299a855
-
SHA256
711c1db67575b1a795a4aeb439ada79ab8a7cc98f2c68cb0e2beacafa5d044de
-
SHA512
90b7a3e7f030e94fa6d3bfe4cdb7103b83d036f62c4f4fa88036f6acc0de420eb38c0174a9cdce08886c2b2790b1916c2e36309c0c9489f3f141686bf45602a9
-
SSDEEP
12288:jjB/BsQKCnIEdAhOUBmFqJwWHXf9HoBH3/:jjBJztIuj2mFW3HZoB
Malware Config
Extracted
vidar
1
Signatures
Files
-
60ad68e8bc5d9b1c96446ecde4f32bea_JaffaCakes118.exe windows:5 windows x86 arch:x86
1ca8e000db29561bd003b1de7f3568eb
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WriteFile
CreateFileA
MultiByteToWideChar
ReadFile
GetFileSize
GetVersionExA
Process32Next
Process32First
CreateToolhelp32Snapshot
TerminateProcess
OpenProcess
GetProcAddress
LoadLibraryA
FreeLibrary
GetPrivateProfileSectionNamesA
GetFileAttributesW
SetFileAttributesW
Sleep
InitializeCriticalSection
InterlockedCompareExchange
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
AreFileApisANSI
SetFilePointer
SetEndOfFile
FlushFileBuffers
UnlockFile
LockFile
LockFileEx
UnlockFileEx
GetFileAttributesA
GetFileAttributesExW
LoadLibraryW
QueryPerformanceCounter
GetTickCount
GetSystemTime
CloseHandle
UnmapViewOfFile
GetTempPathA
GetTempPathW
LocalFree
DeleteFileA
FormatMessageW
GetFullPathNameA
GetFullPathNameW
GetDiskFreeSpaceA
GetDiskFreeSpaceW
CreateFileW
GetSystemInfo
MapViewOfFile
CreateFileMappingA
GetComputerNameA
IsWow64Process
GetCurrentProcess
GlobalMemoryStatus
GetModuleHandleA
GetUserDefaultLocaleName
TzSpecificLocalTimeToSystemTime
GetTimeZoneInformation
GetLocaleInfoA
GetFileSizeEx
FileTimeToSystemTime
GetFileInformationByHandle
SystemTimeToFileTime
GetLocalTime
WriteConsoleW
CompareStringW
SetStdHandle
IsValidLocale
EnumSystemLocalesA
GetUserDefaultLCID
GetLocaleInfoW
GetStringTypeW
WideCharToMultiByte
CopyFileW
CreateMutexA
GetLastError
CreateDirectoryA
SetCurrentDirectoryA
GetSystemTimeAsFileTime
GetCurrentProcessId
ExitProcess
lstrlenA
lstrcpyW
lstrcatW
FindFirstFileW
lstrcmpW
DeleteFileW
FindNextFileW
GetModuleFileNameA
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableA
SetEnvironmentVariableW
GetConsoleMode
GetConsoleCP
GetModuleFileNameW
FindClose
LocalAlloc
FormatMessageA
IsValidCodePage
GetOEMCP
GetACP
HeapSize
GetFileType
InitializeCriticalSectionAndSpinCount
GetStdHandle
SetHandleCount
GetCurrentThreadId
SetLastError
GetModuleHandleW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
HeapCreate
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
IsProcessorFeaturePresent
GetCPInfo
LCMapStringW
GetStartupInfoW
HeapSetInformation
GetCommandLineA
HeapAlloc
HeapReAlloc
InterlockedIncrement
InterlockedDecrement
InterlockedExchange
EncodePointer
DecodePointer
HeapFree
RaiseException
RtlUnwind
GetProcessHeap
user32
GetDesktopWindow
GetSystemMetrics
wsprintfA
EnumDisplayDevicesW
CharToOemA
GetDC
ReleaseDC
GetKeyboardLayoutList
gdi32
CreateCompatibleBitmap
SelectObject
BitBlt
DeleteObject
CreateDCA
GetDeviceCaps
CreateCompatibleDC
advapi32
RegQueryValueExA
RegOpenKeyExA
RegEnumKeyExA
GetUserNameA
GetCurrentHwProfileA
RegCloseKey
shell32
ShellExecuteA
SHGetFolderPathA
ole32
CoCreateInstance
CoUninitialize
shlwapi
PathMatchSpecW
crypt32
CryptUnprotectData
CryptStringToBinaryA
psapi
GetModuleFileNameExA
GetModuleBaseNameA
EnumProcessModules
wininet
HttpAddRequestHeadersA
InternetOpenUrlA
HttpQueryInfoA
InternetOpenA
InternetSetOptionA
InternetConnectA
HttpOpenRequestA
InternetReadFile
InternetSetFilePointer
InternetCloseHandle
HttpSendRequestA
gdiplus
GdipCloneImage
GdiplusStartup
GdiplusShutdown
GdipGetImageEncoders
GdipCreateBitmapFromHBITMAP
GdipSaveImageToFile
GdipFree
GdipAlloc
GdipGetImageEncodersSize
GdipDisposeImage
Sections
.text Size: 438KB - Virtual size: 438KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 75KB - Virtual size: 75KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE