Behavioral task
behavioral1
Sample
5c0711d11192e6d3cfa469d778d87c4a_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
5c0711d11192e6d3cfa469d778d87c4a_JaffaCakes118
-
Size
421KB
-
MD5
5c0711d11192e6d3cfa469d778d87c4a
-
SHA1
09842e86f2e8e15beee1f56cc514e0fc433c073c
-
SHA256
6238deb0321bddb8b5906f78ecad5638b66406e0a29b89ea48153cf16560d184
-
SHA512
316c1495496231f05f8de3075086535bbb640ea953776594c8db1d1534f6b4187a0ab943a61053ba5460fd599db7aa35972d9c5896e672042c8be2e9ae1ef045
-
SSDEEP
6144:PAZbFEypnGy3EJJLVHyRUdIbC2nclBFk2cIAgln3RmFZWC:4ZbFEyFGy0D5MYIbnnclfk2y8noHWC
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5c0711d11192e6d3cfa469d778d87c4a_JaffaCakes118
Files
-
5c0711d11192e6d3cfa469d778d87c4a_JaffaCakes118.exe windows:1 windows x86 arch:x86
a3f6ab9574ea176bfdc0b044238fdd35
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
OemToCharA
LoadBitmapA
ReleaseDC
GetWindowRect
GetClassNameA
BeginPaint
GetDC
EndPaint
SetWindowTextA
CharUpperA
CharLowerA
CreateDialogParamA
GetClientRect
SendMessageA
InvalidateRect
GetDlgItem
GetWindowTextA
EnableWindow
IsWindowVisible
SetFocus
ScreenToClient
CharNextA
InflateRect
SetRectEmpty
GetSystemMetrics
SetWindowPos
UpdateWindow
ShowWindow
DestroyWindow
wsprintfA
LoadStringA
MessageBeep
MessageBoxA
LoadIconA
LoadCursorA
RegisterClassA
CreateWindowExA
SetTimer
PeekMessageA
IsWindow
IsDialogMessageA
TranslateMessage
DispatchMessageA
KillTimer
SetRect
FillRect
CharToOemA
CharPrevA
PostQuitMessage
DefWindowProcA
ExitWindowsEx
FindWindowA
PostMessageA
RegisterWindowMessageA
DdeGetData
DdeFreeDataHandle
DdeConnect
DdeClientTransaction
DdeGetLastError
DdeDisconnect
DdeFreeStringHandle
DdeUninitialize
DdeInitializeA
DdeCreateStringHandleA
GetClassInfoA
GetWindowLongA
GetWindow
GetSysColor
gdi32
SetPixel
GetTextExtentPointA
DeleteObject
GetSystemPaletteEntries
CreatePalette
CreateDIBitmap
CreateBitmap
SetBkColor
CreatePen
MoveToEx
LineTo
CreateCompatibleBitmap
SaveDC
CreateSolidBrush
GetStockObject
Rectangle
RestoreDC
GetDeviceCaps
CreateCompatibleDC
SelectObject
BitBlt
DeleteDC
SelectPalette
RealizePalette
GetObjectA
kernel32
OpenFile
FindClose
GetFileTime
SetFileTime
GetStdHandle
GetCPInfo
GetOEMCP
GetACP
UnhandledExceptionFilter
RtlUnwind
ExitProcess
GetLocalTime
GetCommandLineA
GetEnvironmentStrings
GetStartupInfoA
GlobalHandle
GlobalCompact
GlobalReAlloc
GetCurrentDirectoryA
_llseek
FileTimeToDosDateTime
FileTimeToLocalFileTime
GetFileType
VirtualFree
GetModuleHandleA
WideCharToMultiByte
GetSystemInfo
GetTimeZoneInformation
SetEnvironmentVariableA
MultiByteToWideChar
WinExec
MoveFileExA
GetCurrentThread
GetCurrentProcess
lstrcmpA
CreateDirectoryA
GetDiskFreeSpaceA
GetLastError
FindNextFileA
SetCurrentDirectoryA
GetDriveTypeA
SetFileAttributesA
GetFileAttributesA
RemoveDirectoryA
GetTickCount
GetModuleFileNameA
lstrcpyA
IsDBCSLeadByte
FreeLibrary
GetProcAddress
LoadLibraryA
GetVersion
GlobalFree
GlobalUnlock
FreeResource
_lclose
_hwrite
CreateFileA
lstrcatA
GetWindowsDirectoryA
GlobalLock
GlobalAlloc
LockResource
SizeofResource
LoadResource
FindResourceA
_lread
LocalFileTimeToFileTime
SetErrorMode
lstrcmpiA
GetPrivateProfileStringA
Sleep
lstrlenA
GetSystemDirectoryA
FindFirstFileA
VirtualAlloc
CloseHandle
_lwrite
GetFileSize
SetEndOfFile
DosDateTimeToFileTime
SetFilePointer
ReadFile
WriteFile
DeleteFileA
MoveFileA
version
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
advapi32
RegDeleteValueA
RegCloseKey
RegQueryValueExA
LookupPrivilegeValueA
AdjustTokenPrivileges
OpenThreadToken
OpenProcessToken
GetTokenInformation
EqualSid
RegEnumValueA
RegOpenKeyA
InitializeSecurityDescriptor
RegSetValueExA
RegEnumKeyA
RegDeleteKeyA
RegCreateKeyExA
AllocateAndInitializeSid
SetSecurityDescriptorOwner
FreeSid
comdlg32
GetSaveFileNameA
GetOpenFileNameA
Sections
.text Size: 111KB - Virtual size: 110KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: - Virtual size: 3KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 145KB - Virtual size: 144KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
UPX0 Size: 144KB - Virtual size: 380KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE