Behavioral task
behavioral1
Sample
21d610e4986d3863825a51518fe4cdd9_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
21d610e4986d3863825a51518fe4cdd9_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
21d610e4986d3863825a51518fe4cdd9_JaffaCakes118
-
Size
986KB
-
MD5
21d610e4986d3863825a51518fe4cdd9
-
SHA1
3405d1d258141c81e0bce790eaf11202d0aa7e50
-
SHA256
4798b1c76156b7c2f547c8876539bfba7288ddcdde42a24c114b7a888d940f76
-
SHA512
2e185e26e152488c6a4996eb1d32028c7223357597173fb887ef4bcfc3a4cf0a23d78ce10686f885ec28c9465b29fee7e2c4d8585c39d8ff71c7ffbb5b34115d
-
SSDEEP
24576:2ARzOulKkogcvAVnuZf9C5Df8S1S5fLIVMm/a:rLuZg5Di5fLr
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 21d610e4986d3863825a51518fe4cdd9_JaffaCakes118
Files
-
21d610e4986d3863825a51518fe4cdd9_JaffaCakes118.exe windows:4 windows x86 arch:x86
0e6304c0b359fd07096fe3260893456f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetDiskFreeSpaceExA
lstrcpynA
SizeofResource
FindResourceA
lstrcmpiA
LoadResource
MultiByteToWideChar
GetPrivateProfileStringA
WritePrivateProfileStringA
CreateDirectoryA
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
LoadLibraryA
GetProcAddress
HeapReAlloc
VirtualAlloc
HeapAlloc
GetOEMCP
GetACP
GetTempPathA
RtlUnwind
HeapFree
VirtualFree
HeapCreate
HeapDestroy
GetVersionExA
GetEnvironmentVariableA
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
WideCharToMultiByte
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetVersion
GetCommandLineA
lstrlenA
CreateFileA
WriteFile
ExitProcess
CloseHandle
Sleep
DeleteFileA
EnumResourceNamesA
GetWindowsDirectoryA
lstrcpyA
GetStartupInfoA
GetModuleHandleA
GetModuleFileNameA
lstrcatA
GetCPInfo
advapi32
RegSetValueExA
RegCreateKeyA
RegCloseKey
comctl32
gdi32
SetBkMode
SelectObject
SetTextColor
CreateSolidBrush
CreateFontA
ole32
CoCreateInstance
CoInitialize
CoUninitialize
shell32
SHGetPathFromIDListA
SHGetSpecialFolderLocation
SHBrowseForFolderA
ShellExecuteA
user32
GetWindowRect
MoveWindow
GetClientRect
GetSystemMetrics
LoadStringA
MessageBoxA
SendDlgItemMessageA
GetWindowTextA
SetWindowTextA
GetDlgItemTextA
SetDlgItemTextA
SetTimer
EndDialog
KillTimer
PostQuitMessage
PostMessageA
BeginPaint
SetWindowPos
DrawTextA
EndPaint
DefWindowProcA
SendMessageA
DestroyWindow
wsprintfA
CreateWindowExA
GetSystemMenu
EnableMenuItem
ShowWindow
UpdateWindow
LoadIconA
LoadCursorA
RegisterClassExA
DialogBoxParamA
GetMessageA
DispatchMessageA
TranslateMessage
GetParent
Sections
UPX0 Size: 980KB - Virtual size: 980KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.avp Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE