Behavioral task
behavioral1
Sample
45f535c3146383fb915b6464a2897297_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
45f535c3146383fb915b6464a2897297_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
45f535c3146383fb915b6464a2897297_JaffaCakes118
-
Size
266KB
-
MD5
45f535c3146383fb915b6464a2897297
-
SHA1
6fe30f6a2e0ef5073ab8cd28894bd250af2a4bcd
-
SHA256
812393c0a782bd688192a8a2558d48c79cf3ab5b568414817ac19c8c8336919d
-
SHA512
8dd5d4a17ee1021d25ffbb0abd98e7a5250c44a50c2ffec6b8f0a371c0bf84bce2f11412c9e78082b867cfc63c1b2c092525678b394716145de75c3d55e0d8d8
-
SSDEEP
3072:NW/1lqNqAoPJl+Q7fFOPLfie9rHbK5pWsl8bnDZNnZRfs6pCWtKU7xTVKpfo5Utn:grDPSgFCqiXIQ28bDr5trKpfo5aoo
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 45f535c3146383fb915b6464a2897297_JaffaCakes118
Files
-
45f535c3146383fb915b6464a2897297_JaffaCakes118.exe windows:4 windows x86 arch:x86
54e009db0d04ac6413ca63a9073a239c
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleFileNameW
GetLastError
GetTickCount
GetCurrentProcess
MultiByteToWideChar
GetSystemDirectoryW
GetVersionExA
GetProcessHeap
GetStartupInfoW
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
GetModuleHandleA
TlsAlloc
GetCurrentThreadId
HeapCreate
ExitProcess
GetModuleFileNameA
GetEnvironmentStringsW
GetStartupInfoA
QueryPerformanceCounter
GetCurrentProcessId
GetStringTypeA
GetStringTypeW
Sleep
GetLocaleInfoA
InitializeCriticalSection
LoadLibraryA
BeginUpdateResourceW
GetProcAddress
user32
GetSystemMetrics
EnableMenuItem
mouse_event
PostMessageW
LoadMenuIndirectA
IsMenu
SetCursor
DestroyCursor
GetMenuItemID
wvsprintfA
GetMenuInfo
UnregisterClassA
GetScrollPos
FindWindowW
EnableWindow
GetClassInfoExA
CreateAcceleratorTableW
GetIconInfo
keybd_event
SetWindowPos
CreatePopupMenu
CreateMenu
GetCapture
SetDlgItemTextA
GetDlgItemTextW
EnumClipboardFormats
CharLowerA
GetSysColorBrush
CreateDialogParamW
PeekMessageA
AppendMenuA
MonitorFromWindow
advapi32
RegSetValueExW
RegCloseKey
RegCreateKeyExW
RegOpenKeyExW
RegDeleteKeyW
CloseServiceHandle
StartServiceW
OpenServiceW
OpenSCManagerW
resutils
ResUtilGetProperty
ResUtilVerifyPropertyTable
ResUtilVerifyResourceService
ResUtilGetBinaryValue
ResUtilSetPropertyParameterBlock
ResUtilFindDependentDiskResourceDriveLetter
ResUtilGetProperties
ResUtilSetPropertyParameterBlockEx
ResUtilGetPropertySize
ResUtilGetAllProperties
ResUtilIsResourceClassEqual
ResUtilVerifyService
ResUtilFindDwordProperty
ResUtilGetResourceDependency
ResUtilSetResourceServiceStartParameters
gdi32
CreateDIBSection
GetMetaFileA
CreateBrushIndirect
GetRasterizerCaps
AddFontResourceA
UpdateICMRegKeyA
GetStockObject
d3d8thk
OsThunkDdGetBltStatus
OsThunkDdDestroyMoComp
OsThunkDdCreateMoComp
OsThunkDdGetDriverInfo
OsThunkDdUnlockD3D
OsThunkDdGetDxHandle
OsThunkDdGetDC
Sections
.text Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.idata Size: 3KB - Virtual size: 54KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
CODE Size: 3KB - Virtual size: 243KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 3KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
UPX0 Size: 5KB - Virtual size: 145KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 91KB - Virtual size: 171KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 278KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 233KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 130KB - Virtual size: 175KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
UPX1 Size: 2KB - Virtual size: 406KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ