Behavioral task
behavioral1
Sample
a977818a9aea56ac61944da0a9816cbb_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
a977818a9aea56ac61944da0a9816cbb_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a977818a9aea56ac61944da0a9816cbb_JaffaCakes118
-
Size
289KB
-
MD5
a977818a9aea56ac61944da0a9816cbb
-
SHA1
b0eb66993c0811147a037a0fc258c2e34f083cf8
-
SHA256
a3dc957e5e241c5843327da6e573b87d39f5a082fbff8360320e075155940ba5
-
SHA512
1d43b601de09536d1d618585070a9823e85c2ae4ac91db8589d8d765969f100b268c2b22891cbf0c02a2de5af61d99a994c45f9968b0056b63085fadda2f5c2a
-
SSDEEP
3072:nEcXEC0+bOCsehAsxP/oJ7Cyb6dRS2Y/Y/YYw/YYYzYYYxYYOYIhsqYYpYYYBYYH:7N0+bNAsuWCwsqVuSBpr
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a977818a9aea56ac61944da0a9816cbb_JaffaCakes118
Files
-
a977818a9aea56ac61944da0a9816cbb_JaffaCakes118.exe windows:4 windows x86 arch:x86
f906aaaf8cc678c4262ea6cb48e0326e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
CloseHandle
CreateFileA
GetCommandLineA
GetFileAttributesA
GetFileSize
GetModuleFileNameA
GetProcAddress
LoadLibraryA
ReadFile
SetEndOfFile
WriteFile
GetLastError
GetModuleFileNameA
GetModuleHandleA
GetProcessHeap
HeapAlloc
HeapFree
WriteFile
ReadFile
CloseHandle
SetFilePointer
CreateFileA
GetFileType
GetStartupInfoA
GetStdHandle
GetCommandLineA
GetCurrentProcessId
GetCurrentThreadId
GetCurrentProcess
ReadProcessMemory
SetUnhandledExceptionFilter
ExitProcess
comctl32
InitCommonControls
comdlg32
GetOpenFileNameA
GetSaveFileNameA
gdi32
BitBlt
CombineRgn
CreateBrushIndirect
CreateCompatibleBitmap
CreateCompatibleDC
CreateDIBSection
CreatePenIndirect
CreateRectRgn
CreateRectRgnIndirect
CreateSolidBrush
DeleteDC
DeleteObject
ExcludeClipRect
GetDeviceCaps
GetObjectA
GetStockObject
GetWindowOrgEx
IntersectClipRect
LineTo
MoveToEx
Rectangle
RestoreDC
SaveDC
SelectClipRgn
SelectObject
SetBkColor
SetBkMode
SetBrushOrgEx
SetROP2
SetTextColor
SetWindowOrgEx
StretchDIBits
TextOutA
CreateFontIndirectA
shell32
DragAcceptFiles
DragFinish
DragQueryFileA
Shell_NotifyIconA
user32
BeginPaint
CallWindowProcA
ClientToScreen
ClipCursor
CopyImage
CreateWindowExA
DefWindowProcA
DeleteMenu
DestroyAcceleratorTable
DestroyIcon
DestroyWindow
DispatchMessageA
DrawFocusRect
DrawMenuBar
EnableMenuItem
EnableWindow
EndPaint
FillRect
GetCapture
GetClassInfoA
GetClassLongA
GetClientRect
GetCursorPos
GetDC
GetFocus
GetKeyState
GetParent
GetPropA
GetSysColor
GetSystemMenu
GetUpdateRect
GetUpdateRgn
GetWindow
GetWindowDC
GetWindowLongA
GetWindowRect
GetWindowTextA
GetWindowTextLengthA
InvalidateRect
InvalidateRgn
IsIconic
IsWindow
IsWindowEnabled
IsWindowVisible
IsZoomed
KillTimer
LoadCursorA
LoadIconA
MessageBoxA
PeekMessageA
PostMessageA
PostQuitMessage
RegisterClassA
ReleaseCapture
ReleaseDC
RemovePropA
ScreenToClient
SendMessageA
SetCapture
SetClassLongA
SetCursor
SetFocus
SetForegroundWindow
SetPropA
SetTimer
SetWindowLongA
SetWindowPos
SetWindowTextA
ShowWindow
TranslateMessage
UpdateWindow
ValidateRect
WaitMessage
OffsetRect
InflateRect
MessageBoxA
winmm
mciSendCommandA
mixerClose
mixerGetControlDetailsA
mixerGetLineControlsA
mixerGetLineInfoA
mixerGetNumDevs
mixerOpen
mixerSetControlDetails
Sections
UPX0 Size: 284KB - Virtual size: 284KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.avc Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE