Behavioral task
behavioral1
Sample
406572f6f3d06025f7f6df1d3cf1879d_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
406572f6f3d06025f7f6df1d3cf1879d_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
406572f6f3d06025f7f6df1d3cf1879d_JaffaCakes118
-
Size
267KB
-
MD5
406572f6f3d06025f7f6df1d3cf1879d
-
SHA1
3fd79b627a51662f4ab1ecdafb8ac297ff0570be
-
SHA256
7b8288a3f8262f35db736bdc5361fed4e609318d94591947311ba0cdcae91a9f
-
SHA512
760ee2504ff285c8c30ffd9071986aa2c27ecade0fe256de96b451d39d626ad494237f4033407a07a4be6a51ddc2a37cdee43f68c0fc2f18171e7a5a2d42b353
-
SSDEEP
6144:ZY1lblGg5FIPsGMXeFT+jD/ZWyjj8fFWfV2q:+ZG6IkGMb5fjj8Efsq
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 406572f6f3d06025f7f6df1d3cf1879d_JaffaCakes118
Files
-
406572f6f3d06025f7f6df1d3cf1879d_JaffaCakes118.exe windows:5 windows x86 arch:x86
78813ac1c259270ab5e5660d7fe75110
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
nwprovau
NwEnumConnections
NwSetLogonScript
NwQueryInfo
NPOpenEnum
advapi32
RegOpenKeyExW
RegQueryValueExA
RegCloseKey
RegQueryValueExW
RegSetValueExA
RegCreateKeyExW
kernel32
IsValidCodePage
GetLastError
LocalFree
LocalAlloc
GetEnvironmentVariableA
MultiByteToWideChar
WideCharToMultiByte
WriteConsoleW
GetStdHandle
CloseHandle
IsDBCSLeadByte
SetConsoleCursorPosition
ScrollConsoleScreenBufferA
GetConsoleScreenBufferInfo
CreateFileW
GetTimeFormatW
GetDateFormatW
ReadFile
GetSystemDefaultLCID
FileTimeToSystemTime
DosDateTimeToFileTime
GetTimeZoneInformation
SetConsoleCtrlHandler
GetDriveTypeA
SetFilePointer
CreateFileA
GetModuleHandleA
GetCommandLineA
GetVersionExA
ExitProcess
GetProcAddress
HeapFree
GetCurrentDirectoryA
SetCurrentDirectoryA
HeapAlloc
GetSystemTimeAsFileTime
Beep
ReadConsoleInputA
SetConsoleMode
GetConsoleMode
PeekConsoleInputA
GetNumberOfConsoleInputEvents
SetEnvironmentVariableA
GetFullPathNameA
WriteFile
GetModuleFileNameA
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetStartupInfoA
HeapDestroy
HeapCreate
VirtualFree
GetCPInfo
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
GetProcessHeap
GetStringTypeA
GetStringTypeW
VirtualAlloc
HeapReAlloc
VirtualProtect
GetSystemInfo
VirtualQuery
LCMapStringA
LCMapStringW
SetEnvironmentVariableW
GetFileAttributesA
LoadLibraryA
GetACP
GetOEMCP
SetStdHandle
FlushFileBuffers
CompareStringA
CompareStringW
GetExitCodeProcess
WaitForSingleObject
CreateProcessA
RtlUnwind
GetLocaleInfoW
SetEndOfFile
user32
LoadStringA
CharPrevA
wsprintfW
LoadStringW
mpr
WNetOpenEnumW
WNetEnumResourceA
WNetGetConnection2A
WNetGetConnectionA
WNetCloseEnum
WNetAddConnection2A
WNetCancelConnection2A
WNetGetLastErrorW
ntdll
NtClose
RtlInitUnicodeString
_strcmpi
RtlUnicodeStringToOemString
RtlOemStringToUnicodeString
NtFsControlFile
NtOpenFile
nwapi32
NWDetachFromFileServer
NWGetFileServerVersionInfo
NwNdsReadObjectInfo
NwNdsOpenGenericHandle
NWGetObjectName
NwlibMakeNcp
NWAttachToFileServer
NWReadPropertyValue
NwNdsOpenStream
NwNdsReadAttribute
NwNdsOpenTreeHandle
NwNdsSetTreeContext
NwNdsGetTreeContext
NwNdsResolveName
Sections
.text Size: 104KB - Virtual size: 104KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 5KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
UPX0 Size: 144KB - Virtual size: 380KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE