Behavioral task
behavioral1
Sample
8cc65e1e387096123c77c2ee9aa6c82c_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
8cc65e1e387096123c77c2ee9aa6c82c_JaffaCakes118
-
Size
936KB
-
MD5
8cc65e1e387096123c77c2ee9aa6c82c
-
SHA1
e29e66cde003dc1d314ab3d114002c2eb61940f3
-
SHA256
5b7e1f7a61286871aaae93996088a1338fac68a0f2839f377f666380617d3644
-
SHA512
1bfd6a71406ef0a953df616a6392bf12eeef5e6ddfee0ccaf71df9ce0364ffe204d3c2bb5ab67e2fea73e4cde07ca5001f18ff0c7324c490c7971f086e0766e1
-
SSDEEP
12288:8Uwqt8pg8e+63/JQCOCFhGVrjp12RiYiSpHx:8vqH8eb/JQCOWhKpERiYi8Hx
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8cc65e1e387096123c77c2ee9aa6c82c_JaffaCakes118
Files
-
8cc65e1e387096123c77c2ee9aa6c82c_JaffaCakes118.exe windows:4 windows x86 arch:x86
287a39f5ecb98c91b7bc5ebb5bc5ff1b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LocalReAlloc
TlsGetValue
GetProcessVersion
TlsSetValue
GlobalReAlloc
EnterCriticalSection
ExitProcess
RtlUnwind
TerminateProcess
HeapFree
CreateThread
GetStartupInfoW
SetErrorMode
ExitThread
GetTimeZoneInformation
HeapReAlloc
HeapSize
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
GetCommandLineW
GetCommandLineA
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
GetModuleFileNameA
HeapAlloc
GetVersionExA
RaiseException
DeleteCriticalSection
lstrcmpiA
OpenFileMappingW
VirtualAlloc
IsBadWritePtr
LCMapStringA
LCMapStringW
SetUnhandledExceptionFilter
IsBadReadPtr
IsBadCodePtr
GetStringTypeA
GetStringTypeW
GetCPInfo
SetStdHandle
CompareStringA
CompareStringW
GetACP
GetOEMCP
SetEnvironmentVariableA
Sleep
GetExitCodeProcess
LoadLibraryA
GetExitCodeThread
CloseHandle
ResumeThread
FormatMessageW
LeaveCriticalSection
TlsFree
LocalAlloc
TlsAlloc
InitializeCriticalSection
GetShortPathNameW
SizeofResource
GlobalFlags
GetStringTypeExW
lstrcmpiW
GetThreadLocale
SetEndOfFile
GetVolumeInformationW
MoveFileW
FlushFileBuffers
UnlockFile
LockFile
DuplicateHandle
WriteFile
GetCurrentProcess
GetPrivateProfileIntW
WritePrivateProfileStringW
GetPrivateProfileStringW
SystemTimeToFileTime
MulDiv
FileTimeToSystemTime
LocalFileTimeToFileTime
FileTimeToLocalFileTime
GetFileTime
LocalFree
GetDiskFreeSpaceW
GetTempFileNameW
SetFileTime
GetFullPathNameW
lstrcpyW
lstrcatW
GlobalFindAtomW
SuspendThread
GlobalAddAtomW
CreateEventW
WaitForSingleObject
SetThreadPriority
SetEvent
InterlockedDecrement
MultiByteToWideChar
lstrlenA
lstrcmpA
InterlockedIncrement
lstrcmpW
HeapDestroy
WideCharToMultiByte
GlobalAlloc
GetCurrentThread
GetCurrentThreadId
LockResource
GlobalHandle
GetSystemTime
lstrcpynA
GlobalLock
lstrcpynW
GetLocalTime
lstrlenW
HeapCreate
GlobalGetAtomNameW
GlobalDeleteAtom
FreeLibrary
CreateFileW
GetFileSize
SetFilePointer
ReadFile
CreateFileMappingW
MapViewOfFile
DeleteFileW
FindFirstFileW
FindClose
FindResourceW
FindResourceExW
LoadResource
UnmapViewOfFile
CreateProcessW
VirtualFree
GetEnvironmentVariableA
GlobalUnlock
GetVersion
GetSystemDefaultLCID
GetVersionExW
GetProcAddress
SetLastError
LoadLibraryW
GetLastError
GetModuleHandleA
GetFileAttributesW
FindResourceA
OutputDebugStringA
GetModuleHandleW
GetModuleFileNameW
GetSystemDefaultLangID
FreeEnvironmentStringsW
GetEnvironmentStringsW
GlobalFree
GetProfileStringA
GlobalAddAtomA
user32
UnpackDDElParam
IsDialogMessageW
SetWindowTextW
MoveWindow
InvalidateRect
LoadAcceleratorsW
TranslateAcceleratorW
DestroyMenu
SetMenu
ReleaseDC
GetDC
ClientToScreen
GetWindowDC
BeginPaint
EndPaint
TabbedTextOutW
DrawTextW
GrayStringW
WindowFromPoint
InflateRect
SetRect
SetParent
CharUpperW
ReuseDDElParam
GetClassNameW
GetSysColorBrush
DestroyIcon
GetDCEx
LockWindowUpdate
GetWindowTextLengthW
GetWindowTextW
GetDlgCtrlID
DefWindowProcW
CreateWindowExW
SetPropW
GetPropW
CallWindowProcW
RemovePropW
GetMessageTime
GetMessagePos
GetWindow
SetWindowLongW
SetWindowPos
RegisterWindowMessageW
OffsetRect
IntersectRect
GetWindowPlacement
UnhookWindowsHookEx
GetMenuCheckMarkDimensions
GetMenuState
SetFocus
TrackPopupMenu
GetMessageW
CallNextHookEx
GetCursorPos
SetWindowsHookExW
GetLastActivePopup
ShowOwnedPopups
SendDlgItemMessageA
SendDlgItemMessageW
GetActiveWindow
DestroyWindow
GetWindowLongW
GetDlgItem
IsWindowEnabled
IsRectEmpty
SetRectEmpty
CharNextW
IsWindow
PeekMessageW
TranslateMessage
DispatchMessageW
KillTimer
EnableMenuItem
DrawMenuBar
SetActiveWindow
GetDesktopWindow
IsZoomed
GetSystemMetrics
ReleaseCapture
GetWindowRect
MapWindowPoints
SetCursor
UpdateWindow
SetCapture
PtInRect
LoadCursorW
WinHelpW
RedrawWindow
IsIconic
GetFocus
GetForegroundWindow
GetWindowThreadProcessId
AttachThreadInput
LoadMenuW
DeleteMenu
WaitForInputIdle
EnumThreadWindows
CopyRect
LoadBitmapW
GetSysColor
GetKeyState
GetClientRect
PostQuitMessage
wsprintfW
GetMenu
GetSubMenu
GetParent
SetTimer
SendMessageW
IsWindowVisible
PostMessageW
LoadIconW
EqualRect
DeferWindowPos
BeginDeferWindowPos
EnableWindow
LoadStringW
FindWindowW
ShowWindow
BringWindowToTop
SetForegroundWindow
EndDeferWindowPos
GetTopWindow
IsChild
GetCapture
GetClassInfoW
RegisterClassW
GetMenuItemCount
GetMenuItemID
AdjustWindowRectEx
ScreenToClient
GetNextDlgTabItem
EndDialog
ModifyMenuW
SetMenuItemBitmaps
CheckMenuItem
MessageBoxW
ValidateRect
CreateDialogIndirectParamW
SystemParametersInfoW
RemovePropA
GetWindowLongA
GetWindowTextLengthA
SetWindowsHookExA
ShowCaret
ExcludeUpdateRgn
HideCaret
DrawTextA
UnregisterClassW
GetPropA
SetPropA
SetWindowLongA
GetClassNameA
IsWindowUnicode
SendMessageA
DrawFocusRect
GetWindowTextA
CallWindowProcA
CharNextA
DefWindowProcA
DefDlgProcA
GetClassInfoA
gdi32
BitBlt
CreateBitmap
PatBlt
CreateCompatibleBitmap
CreateSolidBrush
RemoveFontResourceW
GetDeviceCaps
GetClipBox
SetTextColor
SetBkColor
GetObjectW
CreateRectRgnIndirect
DeleteDC
SaveDC
RestoreDC
GetStockObject
SelectObject
SetBkMode
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
SelectClipRgn
ExcludeClipRect
ScaleWindowExtEx
IntersectClipRect
CreateRectRgn
DeleteObject
CreatePatternBrush
PtVisible
RectVisible
ExtTextOutW
Escape
TextOutW
SetRectRgn
CombineRgn
GetTextExtentPoint32W
CreateFontIndirectW
StretchDIBits
GetCharWidthW
GetTextMetricsW
CreateDIBitmap
CreateFontW
GetTextExtentPointA
ExtTextOutA
CreateCompatibleDC
comdlg32
GetOpenFileNameW
GetSaveFileNameW
GetFileTitleW
winspool.drv
GetPrinterW
DocumentPropertiesW
ClosePrinter
GetPrinterDriverW
SetJobW
OpenPrinterW
EnumPrintersW
advapi32
RegOpenKeyW
RegSetValueW
RegCreateKeyW
GetFileSecurityW
SetFileSecurityW
RegDeleteKeyW
GetUserNameW
RegEnumKeyW
RegQueryValueW
RegCreateKeyExW
RegSetValueExW
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
shell32
ExtractIconW
DragQueryFileW
DragFinish
Shell_NotifyIconW
SHGetFileInfoW
comctl32
ImageList_Destroy
ord17
ImageList_Create
Sections
.text Size: 340KB - Virtual size: 338KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 56KB - Virtual size: 53KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 80KB - Virtual size: 99KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 352KB - Virtual size: 349KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.UPX0 Size: 104KB - Virtual size: 252KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE