Behavioral task
behavioral1
Sample
443a254f4661d504c1a917951a88277e_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
443a254f4661d504c1a917951a88277e_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
443a254f4661d504c1a917951a88277e_JaffaCakes118
-
Size
270KB
-
MD5
443a254f4661d504c1a917951a88277e
-
SHA1
67fa0e2cc3077a0791d9d459572b0f783d178dbd
-
SHA256
03cd537721d3a9aada2c0ed8d33fba9cd7565bfebc9695c7131b982c505b088d
-
SHA512
a89e277ba2f98512730a485620b110244d0efd02a47e11d8bd05970c6cd763e7ebde189046d9ced6bc339c8d1d366a0eb9d4f94f7d47fcd395953fffe99774db
-
SSDEEP
3072:xwCQBuGlvPgm+UK1uD72VZB0l1ewNCULnhvcgwglFxKrZgfV8cPB2aRiqfmdkXmw:x+uGpyOYzcPNCwVcgwHrmV8cJlhflf
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 443a254f4661d504c1a917951a88277e_JaffaCakes118
Files
-
443a254f4661d504c1a917951a88277e_JaffaCakes118.exe windows:4 windows x86 arch:x86
88fe37fb326340dc47a9ab399d3380ee
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WideCharToMultiByte
MultiByteToWideChar
lstrcpyA
lstrlenA
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
lstrcatA
GetVersion
SetLastError
MulDiv
LocalFree
LocalAlloc
TlsAlloc
GlobalHandle
TlsFree
GlobalReAlloc
TlsSetValue
InterlockedIncrement
InterlockedDecrement
TlsGetValue
GlobalFlags
WritePrivateProfileStringA
GetLastError
GetProcessVersion
SizeofResource
GetCPInfo
GetOEMCP
SetErrorMode
GetCurrentProcess
ReadFile
SetFilePointer
FlushFileBuffers
SetEndOfFile
LocalReAlloc
lstrcpynA
GetProfileStringA
InterlockedExchange
GlobalFree
GlobalUnlock
ExitProcess
RtlUnwind
GetTimeZoneInformation
GetSystemTime
GetLocalTime
HeapFree
HeapAlloc
RaiseException
HeapReAlloc
GetStartupInfoA
GetCommandLineA
HeapSize
GetACP
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
LCMapStringA
LCMapStringW
SetUnhandledExceptionFilter
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
SetStdHandle
CompareStringA
CompareStringW
SetEnvironmentVariableA
GlobalAlloc
GlobalLock
lstrcmpiA
GlobalDeleteAtom
lstrcmpA
GlobalMemoryStatus
GetCurrentThread
GetCurrentThreadId
EnterCriticalSection
GetVersionExA
GetPrivateProfileStringA
GetComputerNameA
LeaveCriticalSection
WaitForSingleObject
FreeLibrary
DeleteCriticalSection
InitializeCriticalSection
LockResource
FindResourceA
LoadResource
ExpandEnvironmentStringsA
CreateFileA
WriteFile
CreateProcessA
CopyFileA
CreateThread
OpenProcess
DeleteFileA
TerminateThread
GetSystemDirectoryA
TerminateProcess
Sleep
GetProcAddress
GetTickCount
LoadLibraryA
GetTempPathA
GetModuleHandleA
GetModuleFileNameA
CloseHandle
advapi32
RegSetValueExA
RegDeleteValueA
RegCreateKeyExA
RegOpenKeyExA
RegCloseKey
RegQueryValueExA
comctl32
gdi32
GetTextExtentPointA
BitBlt
CreateCompatibleDC
CreateDIBitmap
PatBlt
GetClipBox
SetTextColor
SetBkColor
GetObjectA
RestoreDC
SelectObject
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
CreateSolidBrush
SetBkMode
GetStockObject
SetViewportOrgEx
SetMapMode
SetViewportExtEx
ScaleViewportExtEx
OffsetViewportOrgEx
SetWindowExtEx
ScaleWindowExtEx
IntersectClipRect
GetDeviceCaps
DeleteObject
DeleteDC
SaveDC
CreateBitmap
shell32
ShellExecuteA
user32
GrayStringA
GetWindowRect
GetWindowPlacement
SystemParametersInfoA
IntersectRect
OffsetRect
RegisterWindowMessageA
GetWindow
SetForegroundWindow
GetForegroundWindow
GetMessagePos
GetMessageTime
RemovePropA
CallWindowProcA
GetPropA
UnhookWindowsHookEx
SetPropA
GetClassLongA
GetDlgCtrlID
GetWindowTextA
GetWindowTextLengthA
GetMenuItemID
GetSubMenu
GetMenuItemCount
GetMenu
GetClassInfoA
wsprintfA
WinHelpA
GetCapture
GetTopWindow
CopyRect
ScreenToClient
AdjustWindowRectEx
SetFocus
GetSysColor
MapWindowPoints
SendDlgItemMessageA
UpdateWindow
IsDialogMessageA
ShowWindow
LoadStringA
DestroyMenu
ClientToScreen
GetDC
ReleaseDC
GetWindowDC
BeginPaint
EndPaint
TabbedTextOutA
DrawTextA
LoadCursorA
GetClassNameA
PtInRect
GetSysColorBrush
InvalidateRect
EndDialog
CreateDialogIndirectParamA
GetDlgItem
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
GetMessageA
TranslateMessage
DispatchMessageA
GetKeyState
CallNextHookEx
ValidateRect
GetCursorPos
SetWindowsHookExA
GetLastActivePopup
MessageBoxA
SetCursor
PostQuitMessage
GetWindowLongA
DefWindowProcA
SetWindowLongA
IsWindow
UnregisterClassA
RegisterClassA
CreateWindowExA
IsWindowEnabled
GetActiveWindow
SetActiveWindow
GetParent
EnableWindow
FindWindowA
SetWindowTextA
SetWindowPos
FindWindowExA
PostMessageA
CloseWindow
DestroyWindow
IsIconic
GetSystemMetrics
GetClientRect
DrawIcon
GetSystemMenu
AppendMenuA
SendMessageA
LoadIconA
PeekMessageA
GetWindowThreadProcessId
EnumChildWindows
IsWindowVisible
HideCaret
ShowCaret
ExcludeUpdateRgn
DrawFocusRect
DefDlgProcA
InflateRect
CharNextA
IsWindowUnicode
wininet
InternetOpenUrlA
InternetConnectA
InternetCrackUrlA
HttpSendRequestA
HttpOpenRequestA
InternetCloseHandle
InternetReadFile
InternetOpenA
winmm
mciSendStringA
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
ws2_32
WSASocketA
Sections
UPX0 Size: 252KB - Virtual size: 252KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 10KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.avp Size: 6KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE