Behavioral task
behavioral1
Sample
3d08427fac15fb2c9b35ee0fa44d65ac_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3d08427fac15fb2c9b35ee0fa44d65ac_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3d08427fac15fb2c9b35ee0fa44d65ac_JaffaCakes118
-
Size
245KB
-
MD5
3d08427fac15fb2c9b35ee0fa44d65ac
-
SHA1
8b4624d0832da4bd60944387c4e76d4a6e920e43
-
SHA256
60785353263d63426d6cf122e2d7061a636ce10cc4ddc79cff4d8d482ba3e4e4
-
SHA512
d3f693ac793da02871e47a0c53c389a1294fd763bdca7fdd97ed9da0c40330610f38187ecfe46390813f9486d532f22b73b6a4fde1c64c46ee05f9e0b2f8e02e
-
SSDEEP
3072:d3gGh/JaOqzHtbGTHOIP6BglqeTBfqP4EAZouTWPR:d3pBaXNbAH/UeTB44TxW
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3d08427fac15fb2c9b35ee0fa44d65ac_JaffaCakes118
Files
-
3d08427fac15fb2c9b35ee0fa44d65ac_JaffaCakes118.exe windows:4 windows x86 arch:x86
130ce37d0efe34ec1071f93ced6765ca
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GlobalDeleteAtom
GlobalFindAtomA
GlobalAddAtomA
lstrcmpiA
GlobalGetAtomNameA
lstrcatA
FreeLibrary
LoadLibraryA
GetProcessVersion
GlobalFlags
GetCPInfo
GetOEMCP
GetCurrentProcess
WriteFile
SetFilePointer
FlushFileBuffers
GetModuleHandleA
RtlUnwind
ExitProcess
TerminateProcess
GetTimeZoneInformation
GetSystemTime
GetLocalTime
GetStartupInfoA
GetCommandLineA
HeapAlloc
HeapFree
RaiseException
GetACP
HeapSize
HeapReAlloc
SetStdHandle
GetFileType
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
VirtualAlloc
IsBadWritePtr
SetUnhandledExceptionFilter
IsBadReadPtr
IsBadCodePtr
CompareStringA
CompareStringW
SetEnvironmentVariableA
GetProcAddress
GetCurrentThreadId
lstrcpyA
TlsGetValue
LocalReAlloc
TlsSetValue
GlobalAlloc
GlobalReAlloc
GlobalLock
GlobalHandle
GlobalUnlock
GlobalFree
TlsAlloc
LocalAlloc
GetVersion
lstrcpynA
GetLastError
SetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
lstrcmpA
LocalFree
MultiByteToWideChar
WideCharToMultiByte
lstrlenA
InterlockedDecrement
InterlockedIncrement
CreateThread
CloseHandle
GetModuleFileNameA
GetEnvironmentVariableA
Sleep
CreateDirectoryA
WinExec
GetTickCount
DeleteFileA
CopyFileA
advapi32
RegOpenKeyExA
RegCloseKey
comctl32
gdi32
SetMapMode
SetViewportOrgEx
GetStockObject
SelectObject
RestoreDC
SaveDC
GetClipBox
DeleteDC
DeleteObject
GetDeviceCaps
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetObjectA
CreateBitmap
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
SetTextColor
SetBkColor
urlmon
URLDownloadToFileA
user32
GetMenuItemID
GetSubMenu
GetMenuItemCount
GetMenu
RegisterClassA
GetClassInfoA
WinHelpA
GetCapture
GetTopWindow
CopyRect
GetClientRect
AdjustWindowRectEx
SetFocus
GetSysColor
MapWindowPoints
PostMessageA
LoadIconA
SetWindowTextA
LoadCursorA
GetSysColorBrush
ReleaseDC
GetDC
GetClassNameA
PtInRect
ClientToScreen
PostQuitMessage
DestroyMenu
TabbedTextOutA
DrawTextA
GrayStringA
GetDlgItem
GetWindowTextA
GetDlgCtrlID
DestroyWindow
CreateWindowExA
GetClassLongA
SetPropA
GetPropA
CallWindowProcA
RemovePropA
DefWindowProcA
GetMessageTime
GetMessagePos
GetForegroundWindow
SetForegroundWindow
GetWindow
SetWindowLongA
SetWindowPos
RegisterWindowMessageA
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindowRect
GetSystemMetrics
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
DispatchMessageA
GetKeyState
CallNextHookEx
PeekMessageA
SetWindowsHookExA
GetParent
GetLastActivePopup
IsWindowEnabled
GetWindowLongA
SendMessageA
MessageBoxA
EnableWindow
UnhookWindowsHookEx
LoadStringA
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
ws2_32
Sections
UPX0 Size: 240KB - Virtual size: 240KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.avc Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE