Static task
static1
Behavioral task
behavioral1
Sample
Label_Copy_UPS.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Label_Copy_UPS.exe
Resource
win10v2004-20240508-en
General
-
Target
242dc16b1a09f05176e4da556e20514f_JaffaCakes118
-
Size
45KB
-
MD5
242dc16b1a09f05176e4da556e20514f
-
SHA1
b4ff6f0957383d1b4d3cbe214599ede364ecdf86
-
SHA256
62276ac78569b1d052897ae058d52075e4f935bbd6ddced8c48df54963a38a9b
-
SHA512
16454368bc5b14cfa06d412614c1af568ab847a8ab4b75e5dc717bbc52ec310720f3aebc58e6fbfb45f9ea612712463530e0a2764c73072e55393dfe241f8959
-
SSDEEP
768:s94TDzbSZlFsGuFL5Zg2OBr8g7GFUnWj67DzX0dXmKmSiD5xUthJnU/gAEwNID:s94TvmZWFfsrt7IiWj67DzE4KJheID
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/Label_Copy_UPS.exe
Files
-
242dc16b1a09f05176e4da556e20514f_JaffaCakes118.zip
-
Label_Copy_UPS.exe.exe windows:5 windows x86 arch:x86
ed38890fe8d2e335831dbea37ade806f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetDesktopWindow
GetActiveWindow
IsCharAlphaA
EnumChildWindows
MoveWindow
DialogBoxParamA
SetWindowLongW
ole32
GetClassFile
CoRevokeClassObject
comctl32
InitCommonControlsEx
advapi32
RegQueryValueExA
RegCloseKey
RegOpenKeyExA
kernel32
SetFileAttributesA
DeleteCriticalSection
HeapDestroy
LocalAlloc
HeapFree
LoadResource
FindResourceExA
InitializeCriticalSection
ExitProcess
HeapCreate
FreeLibrary
GetProcAddress
LoadLibraryA
LocalFree
SuspendThread
IsBadStringPtrA
GetTimeZoneInformation
Sections
.text Size: 55KB - Virtual size: 55KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ