Behavioral task
behavioral1
Sample
0cedb1a71e13d61fc16aad2f28b693ad_JaffaCakes118.exe
Resource
win7-20240419-en
General
-
Target
0cedb1a71e13d61fc16aad2f28b693ad_JaffaCakes118
-
Size
860KB
-
MD5
0cedb1a71e13d61fc16aad2f28b693ad
-
SHA1
767458c8437ac2402cb7a106a0969fa3a117846c
-
SHA256
d2b61164dd6e7bc4b442d79ed1525f0f7d4e97f3c060f0c83e5ee07a0d6e830a
-
SHA512
0b6d6fbd045a742b79bde598f27b938e9663ae34b3f7bb7c7dda407df429675273ccb647fc9e0bbd1538cdc225ad1b2069569c13c3bbb14f30833963a1008847
-
SSDEEP
24576:jcu+gKesysDWMkB/cRxSE6gNdf3EqGGLpCYfhGnU+K:Yu+gb3sDWTB/cRxSElNdf30qhGnnK
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0cedb1a71e13d61fc16aad2f28b693ad_JaffaCakes118
Files
-
0cedb1a71e13d61fc16aad2f28b693ad_JaffaCakes118.exe windows:4 windows x86 arch:x86
f4563e64274dd7d1f32f5ba9303af587
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
rpcrt4
UuidCreate
RpcServerRegisterIf
RpcServerUseProtseqEpA
RpcServerUnregisterIf
RpcMgmtStopServerListening
I_RpcGetBuffer
RpcRaiseException
NdrConformantStringUnmarshall
NdrConvert
NdrServerInitializeNew
NdrPointerFree
NdrPointerMarshall
NdrPointerBufferSize
RpcServerListen
kernel32
LocalFree
InterlockedDecrement
LeaveCriticalSection
EnterCriticalSection
GetProcAddress
GetModuleHandleA
Sleep
CreateProcessA
GetDiskFreeSpaceA
CreateFileA
QueryPerformanceFrequency
CreateEventA
SetFilePointer
lstrcmpiA
ReadFile
FindNextFileA
lstrcmpA
SystemTimeToFileTime
GetSystemTime
FileTimeToDosDateTime
FileTimeToLocalFileTime
GetFileSize
GetFileTime
CompareStringA
CompareStringW
GetVersionExA
WriteFile
LocalFileTimeToFileTime
DosDateTimeToFileTime
LoadLibraryExA
SearchPathA
FreeLibrary
WaitForSingleObject
LoadLibraryA
GetVersion
GetWindowsDirectoryA
GetTempPathA
GetTickCount
SetEvent
GetCurrentProcess
GetShortPathNameA
GetSystemDirectoryA
WinExec
SetFileTime
SetFileAttributesA
InterlockedIncrement
MoveFileExA
IsBadWritePtr
IsBadReadPtr
GetPrivateProfileSectionNamesA
WritePrivateProfileSectionA
WritePrivateProfileStringA
RemoveDirectoryA
GlobalFree
GlobalUnlock
GlobalAlloc
GetFileAttributesA
CreateThread
lstrcpynA
GetCurrentThreadId
GetCommandLineA
InitializeCriticalSection
HeapDestroy
DeleteCriticalSection
lstrcatA
CreateFileW
GetLocaleInfoA
LockResource
LoadResource
FindResourceA
IsBadCodePtr
GetStringTypeW
GetStringTypeA
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
VirtualAlloc
VirtualFree
HeapCreate
GetEnvironmentVariableA
UnhandledExceptionFilter
HeapSize
HeapReAlloc
GetOEMCP
GetACP
FormatMessageA
MultiByteToWideChar
SetLastError
GetPrivateProfileSectionA
GetModuleFileNameA
lstrcpyA
GetPrivateProfileStringA
lstrlenA
GetLastError
lstrlenW
WideCharToMultiByte
GetCurrentProcessId
OpenEventA
MoveFileA
CopyFileA
ResetEvent
CloseHandle
DeleteFileA
CreateDirectoryA
FindFirstFileA
FindClose
SetStdHandle
FlushFileBuffers
GetCPInfo
LCMapStringW
LCMapStringA
SetUnhandledExceptionFilter
TlsGetValue
TlsAlloc
ExitProcess
GetStartupInfoA
HeapFree
HeapAlloc
ExitThread
TlsSetValue
RaiseException
RtlUnwind
TerminateProcess
QueryPerformanceCounter
CreateFileMappingA
MapViewOfFile
UnmapViewOfFile
VirtualProtect
VirtualQuery
GetLocalTime
GetCurrentThread
InterlockedExchange
GlobalLock
user32
SendMessageA
SetDlgItemTextA
GetDlgItem
IsDialogMessageA
DestroyWindow
PeekMessageA
MsgWaitForMultipleObjects
CreateDialogIndirectParamA
CharNextA
LoadStringA
ExitWindowsEx
GetMessageA
TranslateMessage
DispatchMessageA
PostThreadMessageA
GetDesktopWindow
CharUpperA
WaitForInputIdle
wsprintfA
MessageBoxA
CharLowerBuffA
gdi32
TranslateCharsetInfo
CreateFontIndirectA
DeleteObject
GetObjectA
advapi32
RegQueryValueA
OpenThreadToken
GetTokenInformation
AllocateAndInitializeSid
EqualSid
FreeSid
RegQueryValueExA
RegEnumValueA
RegEnumKeyExA
RegConnectRegistryA
RegDeleteValueA
RegQueryInfoKeyA
RegSetValueExA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegOpenKeyA
GetFileSecurityA
IsValidSecurityDescriptor
SetFileSecurityA
RegDeleteKeyA
RegCreateKeyExA
RegOpenKeyExA
RegCloseKey
shell32
SHGetPathFromIDListA
SHGetMalloc
SHGetSpecialFolderLocation
ole32
StgCreateDocfile
StgOpenStorage
CoLoadLibrary
CreateItemMoniker
CoTaskMemFree
StringFromCLSID
CoCreateGuid
CoUninitialize
CoMarshalInterThreadInterfaceInStream
CoGetInterfaceAndReleaseStream
CoCreateInstance
ProgIDFromCLSID
WriteClassStm
OleSaveToStream
OleLoadFromStream
CreateStreamOnHGlobal
CoRegisterClassObject
CoRevokeClassObject
CLSIDFromString
CreateFileMoniker
CoReleaseMarshalData
CoMarshalInterface
CoUnmarshalInterface
GetRunningObjectTable
CoInitialize
oleaut32
GetErrorInfo
SysFreeString
SysAllocString
VariantClear
SysAllocStringLen
SysStringLen
VariantChangeType
SysReAllocStringLen
LoadRegTypeLi
VariantInit
VariantCopy
SafeArrayPutElement
SafeArrayDestroy
SafeArrayGetElement
SafeArrayCreate
RegisterTypeLi
LoadTypeLi
SafeArrayCopy
SysStringByteLen
SysAllocStringByteLen
SafeArrayGetDim
SafeArrayGetLBound
SafeArrayGetUBound
VariantCopyInd
SetErrorInfo
CreateErrorInfo
msi
ord160
ord49
ord79
ord103
ord117
ord124
ord31
ord159
ord146
ord8
ord116
ord73
ord112
ord87
ord189
ord18
ord46
ord33
ord136
ord144
ord141
ord168
ord7
ord67
ord93
ord91
ord95
ord120
ord75
ord17
comctl32
ord17
version
VerQueryValueA
GetFileVersionInfoSizeA
GetFileVersionInfoA
Sections
.text Size: 496KB - Virtual size: 493KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 92KB - Virtual size: 88KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 44KB - Virtual size: 128KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 120KB - Virtual size: 117KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.UPX0 Size: 104KB - Virtual size: 252KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE