Behavioral task
behavioral1
Sample
ae10f1cc817f8529fc4baad9658132fb_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
ae10f1cc817f8529fc4baad9658132fb_JaffaCakes118
-
Size
1.2MB
-
MD5
ae10f1cc817f8529fc4baad9658132fb
-
SHA1
20c130e623f873bffab9308daea58a8978f35576
-
SHA256
a6e323659353f3e65cc073dd16fe2c3b544707a8efcf74f5605337fb9ecb40a3
-
SHA512
b1924a8f4572d924d1eaa96989a57b749de0a301799d0bfb91c00957388c9d79968d53f712ff1d29d1a027264a51f635bbcf64e6e23f406f4222d01be33fdf4a
-
SSDEEP
24576:YDUWi06YbO30iglh0xVzkUU9GVw/6LtZmXawNqBplcZhJLsrKevXP:YA8WVwv7KwNuTcZXUKEP
Malware Config
Signatures
-
Detects Strela Stealer payload 1 IoCs
resource yara_rule sample family_strela -
Strela family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ae10f1cc817f8529fc4baad9658132fb_JaffaCakes118
Files
-
ae10f1cc817f8529fc4baad9658132fb_JaffaCakes118.exe windows:4 windows x86 arch:x86
8eb33988246e788e4822a1966e900b39
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
CreateCaret
ShowCaret
GetClipboardData
RegisterClipboardFormatA
SetCursorPos
GetMessageTime
GetDoubleClickTime
HideCaret
DefWindowProcA
GetKeyboardLayout
IsClipboardFormatAvailable
LoadCursorA
SetCursor
UnpackDDElParam
ReuseDDElParam
EnableMenuItem
GetMenu
GetMessagePos
TranslateAcceleratorA
TranslateMDISysAccel
ModifyMenuA
DestroyAcceleratorTable
GetFocus
IsChild
AdjustWindowRectEx
CopyRect
GetDlgCtrlID
GetDesktopWindow
WinHelpA
LoadStringA
RemoveMenu
CreatePopupMenu
CreateAcceleratorTableA
CopyAcceleratorTableA
FindWindowA
OpenClipboard
GetSysColor
GetSysColorBrush
CharUpperA
CharLowerA
IsCharUpperA
IsCharLowerA
IsCharAlphaNumericA
EmptyClipboard
SetClipboardData
CloseClipboard
SetWindowPos
ClientToScreen
GetDlgItem
DrawTextA
MessageBeep
GetWindowTextW
RegisterWindowMessageA
AppendMenuA
GetMenuStringA
InsertMenuA
DestroyMenu
DrawMenuBar
SetCaretPos
SetForegroundWindow
LoadMenuA
GetSubMenu
DeleteMenu
GetMenuItemCount
GetMenuItemID
TrackPopupMenuEx
SystemParametersInfoA
GetWindow
LoadAcceleratorsA
DdeClientTransaction
DdeDisconnect
DdeCreateStringHandleA
DdeConnect
DdeFreeStringHandle
DdeInitializeA
DdeUninitialize
SendMessageW
SetWindowTextW
InvalidateRgn
GetDC
ReleaseDC
InvalidateRect
LoadBitmapA
InflateRect
SetRect
OffsetRect
UpdateWindow
ChangeClipboardChain
SetClipboardViewer
IsZoomed
GetKeyState
IsWindow
IsWindowVisible
GetClassLongA
SetClassLongA
GetNextDlgGroupItem
PostThreadMessageA
InvertRect
LockWindowUpdate
GetDCEx
DestroyIcon
TabbedTextOutA
FillRect
EnableWindow
GetCapture
KillTimer
GetCursorPos
ScreenToClient
PtInRect
SetCapture
SetTimer
ReleaseCapture
PostMessageA
GetParent
SendMessageA
GetWindowRect
GetClientRect
GetCaretPos
SetFocus
IsWindowEnabled
GetTabbedTextExtentA
GetScrollPos
PostQuitMessage
SetRectEmpty
DrawFocusRect
GetKeyNameTextA
MapVirtualKeyA
GetMenuItemInfoA
GetForegroundWindow
IsIconic
wsprintfA
MapDialogRect
SetWindowContextHelpId
CharNextA
GetClassNameA
GetSystemMenu
IsRectEmpty
SetParent
WindowFromPoint
GetWindowThreadProcessId
WaitMessage
GetMessageA
TranslateMessage
ValidateRect
ShowOwnedPopups
DestroyCursor
SetMenu
RedrawWindow
DefMDIChildProcA
DefFrameProcA
BringWindowToTop
GrayStringA
EndPaint
BeginPaint
GetWindowDC
wvsprintfA
GetMenuCheckMarkDimensions
GetMenuState
SetMenuItemBitmaps
CheckMenuItem
ShowWindow
MoveWindow
SetWindowTextA
IsDialogMessageA
ScrollWindowEx
SetDlgItemTextA
GetSystemMetrics
GetWindowPlacement
IntersectRect
SetWindowLongA
GetWindowLongA
GetLastActivePopup
RemovePropA
CallWindowProcA
GetPropA
UnhookWindowsHookEx
SetPropA
CallNextHookEx
SetWindowsHookExA
CreateWindowExA
DestroyWindow
GetWindowTextA
GetWindowTextLengthA
SetWindowPlacement
TrackPopupMenu
RegisterClassA
GetClassInfoA
MessageBoxA
GetTopWindow
SetScrollPos
SetScrollRange
GetScrollRange
ShowScrollBar
SetScrollInfo
GetScrollInfo
ScrollWindow
EndDeferWindowPos
BeginDeferWindowPos
DeferWindowPos
EqualRect
SetActiveWindow
DispatchMessageA
PeekMessageA
MapWindowPoints
SendDlgItemMessageA
LoadIconA
CreateDialogIndirectParamA
GetActiveWindow
EndDialog
GetNextDlgTabItem
UnregisterClassA
comctl32
ImageList_LoadImageA
ord17
ImageList_Destroy
ImageList_Create
ImageList_Draw
ImageList_AddMasked
version
GetFileVersionInfoA
VerQueryValueA
GetFileVersionInfoSizeA
kernel32
lstrcmpW
MultiByteToWideChar
WideCharToMultiByte
lstrcmpA
FindClose
FindFirstFileA
lstrcatA
SetCurrentDirectoryA
GetSystemTime
GlobalFree
GlobalUnlock
lstrcpyW
lstrlenW
GlobalLock
GlobalAlloc
FreeLibrary
lstrcpyA
Sleep
CreateFileMappingA
OpenFileMappingA
FindNextFileA
lstrcpynA
GetModuleFileNameA
GetACP
LoadLibraryA
GetCPInfo
lstrcmpiA
GetCurrentDirectoryA
GetProcAddress
MulDiv
DeleteFileA
GetTempFileNameA
GetTempPathA
GetLastError
SystemTimeToFileTime
GetTickCount
GetCurrentThread
IsValidCodePage
GetVersionExA
CreateFileA
GetFileSize
ReadFile
WriteFile
SetFilePointer
GetShortPathNameA
GetTimeFormatA
GetDateFormatA
LocalFree
FormatMessageA
WaitForSingleObject
IsDBCSLeadByte
CreateProcessA
GlobalAddAtomA
GlobalGetAtomNameA
GetFullPathNameA
SearchPathA
GetProfileIntA
CopyFileA
FileTimeToSystemTime
EnumSystemCodePagesA
UnmapViewOfFile
ExpandEnvironmentStringsA
SetConsoleCtrlHandler
CreatePipe
MapViewOfFile
GetStdHandle
SuspendThread
ResumeThread
GetVolumeInformationA
GetDriveTypeA
CreateDirectoryA
LockResource
LoadResource
LocalAlloc
InterlockedExchange
RaiseException
GetModuleHandleA
GlobalDeleteAtom
GlobalFindAtomA
GetCurrentThreadId
GetVersion
InterlockedIncrement
InterlockedDecrement
SetLastError
SetEvent
SetThreadPriority
CreateEventA
GetPrivateProfileIntA
GetPrivateProfileStringA
WritePrivateProfileStringA
DuplicateHandle
GetCurrentProcess
FlushFileBuffers
LockFile
UnlockFile
SetEndOfFile
MoveFileA
GetStringTypeExA
GetThreadLocale
SetErrorMode
GetFileAttributesA
SetFileTime
GetFileTime
GetDiskFreeSpaceA
GlobalFlags
FileTimeToLocalFileTime
InitializeCriticalSection
TlsAlloc
DeleteCriticalSection
GlobalHandle
TlsFree
LeaveCriticalSection
GlobalReAlloc
EnterCriticalSection
TlsSetValue
LocalReAlloc
TlsGetValue
GetProcessVersion
GetOEMCP
LocalFileTimeToFileTime
GlobalSize
RtlUnwind
HeapFree
HeapAlloc
ExitProcess
TerminateProcess
GetStartupInfoA
GetCommandLineA
CreateThread
ExitThread
HeapReAlloc
HeapSize
GetTimeZoneInformation
GetEnvironmentVariableA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetFileType
SetUnhandledExceptionFilter
IsBadReadPtr
IsBadCodePtr
SetStdHandle
lstrlenA
CompareStringW
SetEnvironmentVariableA
FindResourceA
GlobalMemoryStatus
CloseHandle
CompareStringA
gdi32
GetPolyFillMode
GetStretchBltMode
GetNearestColor
CopyMetaFileA
LPtoDP
GetViewportOrgEx
SetRectRgn
SetAbortProc
StartPage
EndPage
EndDoc
AbortDoc
Escape
TextOutA
RectVisible
PtVisible
GetWindowExtEx
GetViewportExtEx
GetCurrentPositionEx
GetTextAlign
IntersectClipRect
ExcludeClipRect
ScaleWindowExtEx
SetWindowExtEx
SetWindowOrgEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SetStretchBltMode
SetROP2
SetPolyFillMode
RestoreDC
SaveDC
StartDocA
GetClipBox
StretchDIBits
CreateDIBitmap
CreatePatternBrush
SetTextAlign
SelectClipRgn
CreatePolygonRgn
CreateRectRgn
GetRgnBox
Polygon
GetBkColor
GetCharABCWidthsA
GetOutlineTextMetricsA
GetDeviceCaps
CreateICA
EnumFontFamiliesExA
GetTextMetricsA
Rectangle
CreateRectRgnIndirect
CombineRgn
GetStockObject
CreateSolidBrush
DPtoLP
CreateBitmap
GetMapMode
SetMapMode
GetBkMode
GetTextColor
CreatePen
MoveToEx
LineTo
PatBlt
SetBkColor
CreateDCA
SelectObject
GetTextExtentPoint32A
CreateCompatibleDC
CreateCompatibleBitmap
BitBlt
DeleteDC
SetTextColor
GetROP2
GetTextFaceA
GetCharWidthA
GetWindowOrgEx
ExtTextOutA
DeleteObject
GetObjectA
SetBkMode
CreateFontIndirectA
comdlg32
CommDlgExtendedError
ChooseColorA
GetFileTitleA
PrintDlgA
GetSaveFileNameA
GetOpenFileNameA
winspool.drv
DocumentPropertiesA
ClosePrinter
OpenPrinterA
advapi32
RegEnumValueA
RegCreateKeyA
GetFileSecurityA
SetFileSecurityA
RegEnumKeyA
RegOpenKeyA
RegOpenKeyExA
RegCloseKey
RegSetValueA
RegQueryValueA
RegDeleteValueA
RegDeleteKeyA
RegQueryValueExA
RegCreateKeyExA
RegSetValueExA
shell32
DragFinish
DragAcceptFiles
SHGetSpecialFolderLocation
SHGetFileInfoA
DragQueryFileA
ShellExecuteExA
SHFileOperationA
SHBrowseForFolderA
SHGetMalloc
SHGetDesktopFolder
SHGetPathFromIDListA
SHChangeNotify
ShellExecuteA
ExtractIconA
oledlg
ord8
ole32
CLSIDFromString
CLSIDFromProgID
CoTaskMemAlloc
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoGetClassObject
CoFreeUnusedLibraries
OleUninitialize
CoRegisterMessageFilter
OleIsCurrentClipboard
OleFlushClipboard
CoTaskMemFree
ReleaseStgMedium
DoDragDrop
RevokeDragDrop
CoLockObjectExternal
RegisterDragDrop
CoRevokeClassObject
OleDuplicateData
OleGetClipboard
CreateStreamOnHGlobal
OleInitialize
Sections
.text Size: 943KB - Virtual size: 942KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 157KB - Virtual size: 157KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 46KB - Virtual size: 86KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 110KB - Virtual size: 109KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.uuu9 Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ