Behavioral task
behavioral1
Sample
ae3bf79b672004ce316522c173b31276_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
ae3bf79b672004ce316522c173b31276_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ae3bf79b672004ce316522c173b31276_JaffaCakes118
-
Size
164KB
-
MD5
ae3bf79b672004ce316522c173b31276
-
SHA1
8a5e962d8126d78d4cd04773fc8ce1f21a819e74
-
SHA256
5e0a4685cced47f8c107006dad4fb9b629e5f5a605de8de5033e3314c24504ad
-
SHA512
916efe4f198da358c8119888982ae7f5f30724b95239849078b69edfc7ef5375de639061e742fdf709103733e59ae33dddb3439583f2bf92eeed8e6eb5ed4b1b
-
SSDEEP
3072:HnQvohRxlk+aC43Pcbbafrfz6u+Y6CREJQ:Hnxhjlk7PaufvTD6JJQ
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ae3bf79b672004ce316522c173b31276_JaffaCakes118
Files
-
ae3bf79b672004ce316522c173b31276_JaffaCakes118.exe windows:4 windows x86 arch:x86
7d12a83e579f757951adfc7e474bbe00
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LocalAlloc
TlsAlloc
GlobalFree
FreeLibrary
LeaveCriticalSection
GlobalUnlock
GlobalReAlloc
TlsSetValue
LocalReAlloc
TlsGetValue
GlobalFlags
GlobalHandle
WritePrivateProfileStringA
SetLastError
GetProcessVersion
GetFileAttributesA
GetFileSize
GetFileTime
GetCPInfo
GetOEMCP
FileTimeToSystemTime
FileTimeToLocalFileTime
RtlUnwind
TerminateProcess
ExitThread
GetVersion
UnlockFile
lstrcatA
GetTimeZoneInformation
LCMapStringA
LCMapStringW
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetStartupInfoA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
GetStringTypeA
GetStringTypeW
SetUnhandledExceptionFilter
IsBadReadPtr
IsBadCodePtr
SetStdHandle
CompareStringA
CompareStringW
SetEnvironmentVariableA
GlobalFindAtomA
GlobalGetAtomNameA
GlobalAddAtomA
FindFirstFileA
GetFullPathNameA
GetVolumeInformationA
GetProcAddress
FindClose
LoadLibraryA
SetEndOfFile
RaiseException
FlushFileBuffers
LockFile
InterlockedExchange
GetCommandLineA
CreateEventA
SetFilePointer
CreateFileA
ResumeThread
SuspendThread
SetThreadPriority
lstrcpyA
SetEvent
lstrcpynA
HeapReAlloc
SetErrorMode
GlobalLock
GetModuleHandleA
GlobalAlloc
GetLastError
GlobalDeleteAtom
lstrcmpA
lstrcmpiA
GetCurrentThread
GetCurrentThreadId
WideCharToMultiByte
InterlockedDecrement
InterlockedIncrement
CreateThread
GetProcessHeap
HeapAlloc
HeapFree
MultiByteToWideChar
GetModuleFileNameA
lstrlenA
LocalFree
ExitProcess
WriteFile
ReadFile
CreateProcessA
CreatePipe
GetCurrentProcess
DuplicateHandle
CloseHandle
GetStdHandle
WaitForSingleObject
TerminateThread
Sleep
GetACP
HeapSize
advapi32
RegisterServiceCtrlHandlerA
SetServiceStatus
GetAce
StartServiceCtrlDispatcherA
RegCloseKey
RegSetValueExA
AddAccessAllowedAce
InitializeSecurityDescriptor
GetSecurityDescriptorDacl
GetAclInformation
InitializeAcl
AddAce
SetSecurityDescriptorDacl
GetTokenInformation
GetLengthSid
CopySid
LogonUserA
CreateProcessAsUserA
RegCreateKeyExA
RegQueryValueExA
RegOpenKeyExA
comctl32
comdlg32
GetFileTitleA
gdi32
DeleteObject
DeleteDC
SaveDC
RestoreDC
SelectObject
GetStockObject
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
CreateBitmap
GetDeviceCaps
RectVisible
TextOutA
PtVisible
Escape
ExtTextOutA
SetBkColor
SetTextColor
GetObjectA
GetClipBox
netapi32
NetUserDel
NetUserAdd
NetLocalGroupAddMembers
user32
CopyRect
GetClientRect
AdjustWindowRectEx
SetFocus
GetFocus
GetSysColor
MapWindowPoints
LoadIconA
SetWindowTextA
ShowWindow
IsWindowEnabled
GetNextDlgTabItem
EnableMenuItem
CheckMenuItem
SetMenuItemBitmaps
ModifyMenuA
GetMenuState
LoadBitmapA
GetMenuCheckMarkDimensions
SetCursor
GetClassNameA
PtInRect
ClientToScreen
GetDC
ReleaseDC
TabbedTextOutA
DrawTextA
GrayStringA
LoadCursorA
GetSysColorBrush
DestroyMenu
MessageBoxA
GetParent
GetCapture
WinHelpA
GetClassInfoA
RegisterClassA
GetMenu
GetMenuItemCount
GetSubMenu
GetMenuItemID
GetDlgItem
GetWindowTextA
GetDlgCtrlID
DefWindowProcA
DestroyWindow
CreateWindowExA
GetClassLongA
SetPropA
UnhookWindowsHookEx
GetPropA
CallWindowProcA
RemovePropA
GetMessageTime
GetMessagePos
GetLastActivePopup
GetForegroundWindow
SetForegroundWindow
GetWindow
GetWindowLongA
SetWindowLongA
RegisterWindowMessageA
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindowRect
GetSystemMetrics
CharUpperA
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
SendMessageA
ValidateRect
IsWindowVisible
PeekMessageA
GetCursorPos
SetWindowsHookExA
LoadStringA
PostMessageA
PostQuitMessage
GetUserObjectSecurity
SetUserObjectSecurity
OpenWindowStationA
SetProcessWindowStation
OpenDesktopA
CloseWindowStation
CloseDesktop
EnableWindow
wsprintfA
GetTopWindow
CallNextHookEx
GetKeyState
SetWindowPos
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
ws2_32
Sections
UPX0 Size: 156KB - Virtual size: 156KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.avp Size: 6KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE