Behavioral task
behavioral1
Sample
2440695de5d7edb5d91510d5adeb8135_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
2440695de5d7edb5d91510d5adeb8135_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
2440695de5d7edb5d91510d5adeb8135_JaffaCakes118
-
Size
219KB
-
MD5
2440695de5d7edb5d91510d5adeb8135
-
SHA1
155f53e4207ce6e1c6455e85331b9e93e62eabe6
-
SHA256
9a06117a30e15adac48bba84b788af5552183cd21882b3bf1664d72d813384c7
-
SHA512
f2cd9481f98945b0ad99165da3241c8ec3abcaa4a82aa78a44784b5a63b0d24a9972a05b448c06c81a48e83fe8733ccd6af4c6aaf7a31e8e22aa52e8443e83fa
-
SSDEEP
3072:UblvJHNwqO2k4Ktvt3tVzXgl1eL8lQnvyZYwVRUCemUeRCBm6MK/8D3pRO:Ublvhypxtdae8lRTVWCeyRSm6MKUDi
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2440695de5d7edb5d91510d5adeb8135_JaffaCakes118
Files
-
2440695de5d7edb5d91510d5adeb8135_JaffaCakes118.exe windows:4 windows x86 arch:x86
6d8c855dadbaf7743ffb97919dc64808
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ExitProcess
RtlUnwind
HeapAlloc
HeapFree
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
GetSystemTimeAsFileTime
TerminateProcess
GetStartupInfoA
GetCommandLineA
HeapReAlloc
HeapSize
SetStdHandle
GetFileType
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetOEMCP
HeapDestroy
HeapCreate
VirtualFree
IsBadWritePtr
GetStringTypeA
GetStringTypeW
LCMapStringA
LCMapStringW
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
SetUnhandledExceptionFilter
GetTimeZoneInformation
IsBadReadPtr
IsBadCodePtr
SetEnvironmentVariableA
GetCPInfo
GlobalFlags
WritePrivateProfileStringA
SetErrorMode
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
TlsGetValue
GlobalHandle
GlobalReAlloc
InterlockedIncrement
InterlockedDecrement
RaiseException
GlobalGetAtomNameA
GlobalFindAtomA
lstrcmpW
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
LocalAlloc
GlobalAddAtomA
GetCurrentThread
GetCurrentThreadId
FreeLibrary
GlobalDeleteAtom
lstrcmpA
GetModuleHandleA
ConvertDefaultLocale
EnumResourceLanguagesA
LoadLibraryA
GetProcAddress
GetCurrentProcess
DuplicateHandle
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
SetLastError
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
FormatMessageA
lstrcpynA
LocalFree
lstrcatA
ReadFile
GetFileTime
DosDateTimeToFileTime
LocalFileTimeToFileTime
SetFileTime
GetFullPathNameA
lstrcpyA
WaitForSingleObject
GetFileSize
FileTimeToLocalFileTime
FileTimeToSystemTime
GetVolumeInformationA
GetSystemDirectoryA
CreateProcessA
DeleteFileA
GetComputerNameA
CreateFileA
WriteFile
CloseHandle
CreateDirectoryA
CompareStringW
CompareStringA
lstrcmpiA
GetVersion
GetLastError
GetModuleFileNameA
MultiByteToWideChar
GetFileAttributesA
FindFirstFileA
FindClose
WideCharToMultiByte
FindResourceA
LoadResource
LockResource
SizeofResource
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
lstrlenA
advapi32
RegQueryValueExA
RegCreateKeyExA
RegSetValueExA
RegOpenKeyExA
RegDeleteKeyA
RegCloseKey
RegQueryValueA
RegEnumKeyA
RegOpenKeyA
comctl32
comdlg32
GetFileTitleA
gdi32
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetStockObject
DeleteDC
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
CreateBitmap
GetDeviceCaps
SetMapMode
RestoreDC
SaveDC
DeleteObject
SetBkColor
SetTextColor
GetClipBox
Escape
iphlpapi
GetAdaptersInfo
netapi32
Netbios
ole32
CoCreateInstance
CoInitialize
oleaut32
shell32
SHGetPathFromIDListA
SHGetSpecialFolderLocation
SHGetMalloc
shlwapi
PathIsUNCA
PathFindExtensionA
PathFindFileNameA
PathStripToRootA
UrlUnescapeA
user32
DestroyMenu
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
ClientToScreen
LoadCursorA
GetDC
ReleaseDC
GetSysColorBrush
ShowWindow
SetWindowTextA
WinHelpA
GetCapture
CreateWindowExA
GetClassLongA
GetClassInfoExA
GetClassNameA
SetPropA
GetPropA
RemovePropA
GetWindowTextA
GetForegroundWindow
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
LoadIconA
SetForegroundWindow
GetClientRect
GetMenu
GetSysColor
AdjustWindowRectEx
GetClassInfoA
RegisterClassA
UnregisterClassA
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
SetWindowLongA
SetWindowPos
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindowRect
CopyRect
PtInRect
GetWindow
DestroyWindow
GetDlgItem
RegisterWindowMessageA
SetMenuItemBitmaps
GetFocus
ModifyMenuA
EnableMenuItem
CheckMenuItem
GetMenuCheckMarkDimensions
LoadBitmapA
SetWindowsHookExA
CallNextHookEx
GetMessageA
GetActiveWindow
IsWindowVisible
GetKeyState
GetCursorPos
ValidateRect
GetParent
GetWindowLongA
GetLastActivePopup
IsWindowEnabled
SetCursor
PostQuitMessage
MapWindowPoints
PostMessageA
GetSystemMetrics
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
EnableWindow
SendMessageA
PeekMessageA
DispatchMessageA
TranslateMessage
CharUpperA
MessageBoxA
wsprintfA
wininet
InternetCloseHandle
HttpOpenRequestA
InternetConnectA
HttpSendRequestA
InternetWriteFile
InternetSetFilePointer
InternetSetStatusCallback
InternetGetLastResponseInfoA
HttpQueryInfoA
InternetCanonicalizeUrlA
InternetCrackUrlA
InternetOpenA
InternetReadFile
InternetQueryDataAvailable
InternetOpenUrlA
winspool.drv
DocumentPropertiesA
ClosePrinter
OpenPrinterA
Sections
UPX0 Size: 212KB - Virtual size: 212KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.avp Size: 6KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE