Behavioral task
behavioral1
Sample
4e126a0d21fb19691db0e53ed88c8906_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
4e126a0d21fb19691db0e53ed88c8906_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
4e126a0d21fb19691db0e53ed88c8906_JaffaCakes118
-
Size
652KB
-
MD5
4e126a0d21fb19691db0e53ed88c8906
-
SHA1
0a52163d67a9029f517bf982e3dd8a870b372658
-
SHA256
61cc7ba6bbe901c718df3139c1e7482ce0261fb0f8e73d56b8242bd51e5b55e3
-
SHA512
73f961e7aab8bfa11690f8d2d5111884be09b86c712d416c995664d987da993e6311218bbe4ae399904aed73e15652a218eb40538e694e3f759b65b77f59eca3
-
SSDEEP
12288:kOIrmedBigNA8BmUE5h4ytt0FPSQ1WjHkzRzn5ZOPa9z3:0maB3FmUEj4ytt0FPB1Su
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4e126a0d21fb19691db0e53ed88c8906_JaffaCakes118
Files
-
4e126a0d21fb19691db0e53ed88c8906_JaffaCakes118.exe windows:4 windows x86 arch:x86
0fd717d64c1391f64ebd9740b29d7d51
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetFileType
SetHandleCount
GetStdHandle
GetEnvironmentVariableA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
SetUnhandledExceptionFilter
Sleep
SetStdHandle
IsBadCodePtr
CompareStringA
CompareStringW
IsValidLocale
IsValidCodePage
GetLocaleInfoA
EnumSystemLocalesA
GetUserDefaultLCID
GetLocaleInfoW
GetWindowsDirectoryA
DeviceIoControl
GetSystemDefaultLangID
GetLocalTime
GetSystemTime
GetTimeZoneInformation
GetACP
HeapSize
HeapReAlloc
RaiseException
GetDriveTypeA
FindResourceExA
InterlockedExchange
GetCommandLineA
GetStartupInfoA
TerminateProcess
ExitProcess
HeapAlloc
HeapFree
RtlUnwind
SizeofResource
FileTimeToLocalFileTime
FileTimeToSystemTime
GetFileSize
lstrlenW
GetOEMCP
GetCPInfo
GetFullPathNameA
FindFirstFileA
FindClose
SetEndOfFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
CreateFileA
GetCurrentProcess
SetErrorMode
GetProcessVersion
FindResourceA
LoadResource
LockResource
GetVersion
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GetModuleHandleA
GetCurrentDirectoryA
GetModuleFileNameA
GlobalFlags
MulDiv
TlsGetValue
LocalReAlloc
TlsSetValue
GlobalReAlloc
TlsFree
GlobalHandle
GlobalUnlock
GlobalFree
TlsAlloc
LocalAlloc
lstrcpynA
GetLastError
SetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
GetTickCount
WritePrivateProfileStringA
GetPrivateProfileStringA
CreateEventA
WaitForSingleObject
CloseHandle
GlobalLock
GlobalAlloc
GlobalDeleteAtom
lstrcmpA
lstrcmpiA
GetCurrentThread
GetCurrentThreadId
FormatMessageA
LocalFree
WideCharToMultiByte
InterlockedDecrement
InterlockedIncrement
MultiByteToWideChar
SetCurrentDirectoryA
SetEnvironmentVariableA
lstrcpyA
lstrcatA
GetVersionExA
lstrlenA
WinExec
LoadLibraryA
GetProcAddress
FreeLibrary
IsBadReadPtr
user32
GetTopWindow
IsChild
WinHelpA
GetClassInfoA
RegisterClassA
GetMenu
GetSubMenu
GetMenuItemID
DestroyWindow
CreateWindowExA
GetClassLongA
SetPropA
GetPropA
CallWindowProcA
RemovePropA
DefWindowProcA
GetMessageTime
GetMessagePos
GetForegroundWindow
SetForegroundWindow
RegisterWindowMessageA
OffsetRect
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetSystemMetrics
SetFocus
ShowWindow
SetWindowPos
MoveWindow
SetWindowLongA
GetWindowTextLengthA
IsDialogMessageA
SendDlgItemMessageA
GetDlgItem
GrayStringA
DrawTextA
TabbedTextOutA
EndPaint
BeginPaint
GetWindowDC
CopyRect
GetDC
GetMenuItemCount
IsWindowEnabled
MessageBoxA
EnableWindow
GetWindowTextA
SetWindowTextA
GetWindow
GetDlgCtrlID
PostMessageA
PostQuitMessage
SendMessageA
SetCursor
SetWindowsHookExA
GetWindowRect
PtInRect
GetClassNameA
ScreenToClient
ClientToScreen
GetWindowLongA
WindowFromPoint
GetDesktopWindow
ReleaseCapture
SetCapture
LoadCursorA
GetCapture
GetLastActivePopup
LoadStringA
RegisterClipboardFormatA
wsprintfA
UnhookWindowsHookEx
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetParent
GetNextDlgTabItem
GetMessageA
TranslateMessage
EnumChildWindows
MapDialogRect
KillTimer
SetTimer
CopyIcon
InflateRect
DispatchMessageA
GetActiveWindow
GetCursorPos
UnregisterClassA
GetAsyncKeyState
PeekMessageA
IsWindowVisible
ValidateRect
CallNextHookEx
GetKeyState
MessageBeep
RedrawWindow
DestroyCursor
SetRect
AdjustWindowRect
EndDialog
CreateDialogIndirectParamA
InvalidateRect
DestroyMenu
PostThreadMessageA
GetSysColorBrush
LoadIconA
UpdateWindow
MapWindowPoints
GetSysColor
SetActiveWindow
IsWindow
AdjustWindowRectEx
GetClientRect
ReleaseDC
gdi32
GetDeviceCaps
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
GetObjectA
GetTextExtentPoint32A
CreateFontIndirectA
CreateFontA
GetTextFaceA
SetTextJustification
GetClipBox
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
SetTextColor
SetBkMode
SetBkColor
GetStockObject
SelectObject
RestoreDC
SaveDC
DeleteDC
EnumFontFamiliesExA
DeleteObject
CreateBitmap
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
AllocateAndInitializeSid
RegQueryValueA
RegOpenKeyExA
RegQueryValueExA
RegEnumValueA
RegCloseKey
SetEntriesInAclA
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
FreeSid
RegEnumKeyExA
RegOpenKeyA
RegDeleteValueA
RegCreateKeyExA
RegSetValueExA
shell32
ShellExecuteA
comctl32
PropertySheetA
ord17
oledlg
ord8
ole32
OleIsCurrentClipboard
OleFlushClipboard
CoUninitialize
CoInitialize
CoInitializeEx
CoRevokeClassObject
CoRegisterMessageFilter
CoFreeUnusedLibraries
OleUninitialize
OleInitialize
CoCreateInstance
oleaut32
SysAllocStringLen
SysFreeString
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
wininet
InternetCanonicalizeUrlA
Sections
.text Size: 288KB - Virtual size: 284KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 56KB - Virtual size: 53KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 80KB - Virtual size: 95KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 116KB - Virtual size: 113KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.UPX0 Size: 108KB - Virtual size: 260KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE