Behavioral task
behavioral1
Sample
24a7ba18cf47c16ed3c04184bbf845fc_JaffaCakes118.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
24a7ba18cf47c16ed3c04184bbf845fc_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
24a7ba18cf47c16ed3c04184bbf845fc_JaffaCakes118
-
Size
249KB
-
MD5
24a7ba18cf47c16ed3c04184bbf845fc
-
SHA1
5825e151fb17bc3404202c44791e2664f1788adb
-
SHA256
63d8d756c3a62ae52e1431b4fe23e1a5430d25a70c36e43dd97c3dcc9cf83ecf
-
SHA512
d581f8d4e4b759b1d08bfec9d1e64d17f3618b4aab57bd56f97a75416fc40b725c4f8740c1945eb458f5b0ba326c802144fcd860c86c5d46d056dc10e0cd6a50
-
SSDEEP
3072:VKIUaB1yi8fRrbL5+eKuG9neKxTBfC3y3OVlhLtoxR:V7fydf9L8z/xTBqMyhL
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 24a7ba18cf47c16ed3c04184bbf845fc_JaffaCakes118
Files
-
24a7ba18cf47c16ed3c04184bbf845fc_JaffaCakes118.exe windows:4 windows x86 arch:x86
130ce37d0efe34ec1071f93ced6765ca
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GlobalDeleteAtom
GlobalFindAtomA
GlobalAddAtomA
lstrcmpiA
GlobalGetAtomNameA
lstrcatA
FreeLibrary
LoadLibraryA
GetProcessVersion
GlobalFlags
GetCPInfo
GetOEMCP
GetCurrentProcess
WriteFile
SetFilePointer
FlushFileBuffers
GetModuleHandleA
RtlUnwind
ExitProcess
TerminateProcess
GetTimeZoneInformation
GetSystemTime
GetLocalTime
GetStartupInfoA
GetCommandLineA
HeapAlloc
HeapFree
RaiseException
GetACP
HeapSize
HeapReAlloc
SetStdHandle
GetFileType
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
VirtualAlloc
IsBadWritePtr
SetUnhandledExceptionFilter
IsBadReadPtr
IsBadCodePtr
CompareStringA
CompareStringW
SetEnvironmentVariableA
GetProcAddress
GetCurrentThreadId
lstrcpyA
TlsGetValue
LocalReAlloc
TlsSetValue
GlobalAlloc
GlobalReAlloc
GlobalLock
GlobalHandle
GlobalUnlock
GlobalFree
TlsAlloc
LocalAlloc
GetVersion
lstrcpynA
GetLastError
SetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
lstrcmpA
LocalFree
MultiByteToWideChar
WideCharToMultiByte
lstrlenA
InterlockedDecrement
InterlockedIncrement
CreateThread
CloseHandle
GetModuleFileNameA
GetEnvironmentVariableA
Sleep
CreateDirectoryA
WinExec
GetTickCount
DeleteFileA
CopyFileA
advapi32
RegOpenKeyExA
RegCloseKey
comctl32
gdi32
SetMapMode
SetViewportOrgEx
GetStockObject
SelectObject
RestoreDC
SaveDC
GetClipBox
DeleteDC
DeleteObject
GetDeviceCaps
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetObjectA
CreateBitmap
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
SetTextColor
SetBkColor
urlmon
URLDownloadToFileA
user32
GetMenuItemID
GetSubMenu
GetMenuItemCount
GetMenu
RegisterClassA
GetClassInfoA
WinHelpA
GetCapture
GetTopWindow
CopyRect
GetClientRect
AdjustWindowRectEx
SetFocus
GetSysColor
MapWindowPoints
PostMessageA
LoadIconA
SetWindowTextA
LoadCursorA
GetSysColorBrush
ReleaseDC
GetDC
GetClassNameA
PtInRect
ClientToScreen
PostQuitMessage
DestroyMenu
TabbedTextOutA
DrawTextA
GrayStringA
GetDlgItem
GetWindowTextA
GetDlgCtrlID
DestroyWindow
CreateWindowExA
GetClassLongA
SetPropA
GetPropA
CallWindowProcA
RemovePropA
DefWindowProcA
GetMessageTime
GetMessagePos
GetForegroundWindow
SetForegroundWindow
GetWindow
SetWindowLongA
SetWindowPos
RegisterWindowMessageA
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindowRect
GetSystemMetrics
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
DispatchMessageA
GetKeyState
CallNextHookEx
PeekMessageA
SetWindowsHookExA
GetParent
GetLastActivePopup
IsWindowEnabled
GetWindowLongA
SendMessageA
MessageBoxA
EnableWindow
UnhookWindowsHookEx
LoadStringA
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
ws2_32
Sections
UPX0 Size: 244KB - Virtual size: 244KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.avp Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE