Behavioral task
behavioral1
Sample
a0054d8d0d1b18234f91bacc2bb4ae2a_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a0054d8d0d1b18234f91bacc2bb4ae2a_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a0054d8d0d1b18234f91bacc2bb4ae2a_JaffaCakes118
-
Size
159KB
-
MD5
a0054d8d0d1b18234f91bacc2bb4ae2a
-
SHA1
263a224948c590fbdb1887b93e777213263c1045
-
SHA256
24123fd14a911d5e9a7916a9220174b0ef8f2b2897ea4092d11d7f74ba0b794d
-
SHA512
2e484d76e76f8d0ed4d46efa9ab4ea19809cbf768ba09e3d8a7467503513c55db0fcb4c0c0559840c00494274edd5019fcf39ddd96604ea3963f80ad9a3eb836
-
SSDEEP
3072:qMSsQNxJUJTxvK27QQEW90uZJLQLLYILDRU37kLFAt37nRBEONv9JdCw:DQOF90uZJELJskLFAt37RBERw
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a0054d8d0d1b18234f91bacc2bb4ae2a_JaffaCakes118
Files
-
a0054d8d0d1b18234f91bacc2bb4ae2a_JaffaCakes118.exe windows:4 windows x86 arch:x86
b4e0151a222ad217806d8344bc933b60
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
ord17
version
VerQueryValueA
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerInstallFileA
kernel32
CloseHandle
Sleep
lstrlenW
DeleteFileA
GetAtomNameA
RemoveDirectoryA
SetEvent
OpenEventA
AddAtomA
HeapDestroy
GetModuleHandleA
GetStartupInfoA
HeapCreate
ExitProcess
GetCommandLineA
HeapAlloc
CompareStringA
HeapFree
LockResource
LoadResource
CompareStringW
GetVersionExA
SetErrorMode
LocalFree
FormatMessageA
InterlockedDecrement
CreateProcessA
CreateFileA
CopyFileA
GetTempFileNameA
GetTempPathA
WaitForSingleObject
SetFileAttributesA
ReadFile
GetShortPathNameA
GetPrivateProfileStringA
GetFileAttributesA
CreateDirectoryA
GlobalLock
GlobalAlloc
MultiByteToWideChar
GetModuleFileNameA
RtlUnwind
WideCharToMultiByte
lstrlenA
GlobalUnlock
GlobalFree
GetLastError
SetLastError
lstrcpyA
lstrcatA
GetUserDefaultLangID
GetPrivateProfileIntA
FindResourceA
FindResourceExA
GetWindowsDirectoryA
user32
TranslateMessage
PeekMessageA
GetWindowLongA
EndDialog
GetDlgItem
SendMessageA
SetWindowLongA
DispatchMessageA
IsDialogMessageA
CreateDialogIndirectParamA
SetDlgItemTextA
GetDesktopWindow
GetClientRect
GetWindowRect
MoveWindow
CharNextA
CharUpperA
CharLowerA
ReleaseDC
LoadImageA
GetDC
EndPaint
CreateDialogParamA
BeginPaint
DialogBoxIndirectParamA
MessageBoxA
DestroyWindow
wsprintfA
gdi32
DeleteDC
SelectObject
RealizePalette
SelectPalette
UnrealizeObject
CreateCompatibleDC
GetObjectA
GetDeviceCaps
CreateHalftonePalette
CreatePalette
GetSystemPaletteEntries
GetDIBColorTable
BitBlt
advapi32
RegCreateKeyA
RegCloseKey
RegOpenKeyExA
RegSetValueExA
RegOpenKeyA
RegQueryValueExA
ole32
CoCreateInstance
CoFreeAllLibraries
CoInitialize
CoUninitialize
oleaut32
SysAllocStringLen
SysStringLen
SysFreeString
SafeArrayGetLBound
VariantClear
SafeArrayGetElement
SysAllocString
SafeArrayGetUBound
Sections
.text Size: 29KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.UPX0 Size: 104KB - Virtual size: 252KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE