Behavioral task
behavioral1
Sample
b69cfb49d50c4e756643d487924c1679_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b69cfb49d50c4e756643d487924c1679_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b69cfb49d50c4e756643d487924c1679_JaffaCakes118
-
Size
258KB
-
MD5
b69cfb49d50c4e756643d487924c1679
-
SHA1
8673dc7fbb8b0a3a21ffd6353cc4976c25834a46
-
SHA256
d7ba84d0c76dba7bcc8f60e9da7e198c50b9035e38015f9b874dc2e656274cc1
-
SHA512
4be2df9d3b56b568b6cf01bb993d6af33a8fbfabc5892dcd3c767f774ad51868e899a437f50b774e9b26b305263e5df412b44727070f8e2de6310bb4ea709c4d
-
SSDEEP
6144:LyGJrIrIDtvn2f4Kpb66Ki19fzwXSmi6LVnH2Ng2l2EL/:LxIkDBfm66x/SZt2BXL/
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b69cfb49d50c4e756643d487924c1679_JaffaCakes118
Files
-
b69cfb49d50c4e756643d487924c1679_JaffaCakes118.exe windows:4 windows x86 arch:x86
13456852a7ae190cc307f9ec99be787f
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleFileNameW
GetLastError
GetTickCount
GetCurrentProcess
MultiByteToWideChar
GetSystemDirectoryW
GetVersionExA
GetProcessHeap
GetStartupInfoW
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
GetModuleHandleA
TlsAlloc
GetCurrentThreadId
HeapCreate
ExitProcess
GetModuleFileNameA
GetEnvironmentStringsW
GetStartupInfoA
QueryPerformanceCounter
GetCurrentProcessId
GetStringTypeA
GetStringTypeW
Sleep
GetLocaleInfoA
InitializeCriticalSection
LoadLibraryA
GetProcAddress
user32
GetSystemMetrics
GetCapture
CharNextA
GetMenuStringW
SetDlgItemInt
DialogBoxParamA
EnableWindow
EndDialog
UnregisterClassW
LoadCursorW
CopyIcon
CharLowerA
wvsprintfA
PostMessageA
SetFocus
mouse_event
IsWindow
DestroyCursor
InvalidateRgn
DestroyMenu
GetDlgItemTextA
CreateDialogIndirectParamW
GetClassInfoW
MessageBoxA
AppendMenuA
WinHelpW
LoadMenuIndirectA
advapi32
RegSetValueExW
RegCloseKey
RegCreateKeyExW
RegOpenKeyExW
RegDeleteKeyW
CloseServiceHandle
StartServiceW
OpenServiceW
OpenSCManagerW
usp10
ScriptGetProperties
ScriptStringOut
ScriptStringCPtoX
UspFreeMem
ScriptBreak
ScriptFreeCache
gdi32
GetTextExtentPointA
UpdateICMRegKeyW
StretchDIBits
SetWinMetaFileBits
CreatePolygonRgn
CreateBitmap
GetTextExtentPointW
CreateSolidBrush
GetEnhMetaFilePixelFormat
secur32
EncryptMessage
QuerySecurityPackageInfoA
InitializeSecurityContextA
SecpTranslateNameEx
LsaLogonUser
SaslEnumerateProfilesA
ImportSecurityContextW
ImportSecurityContextA
SecpFreeMemory
CompleteAuthToken
DeleteSecurityPackageW
QueryCredentialsAttributesA
Sections
.text Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
UPX1 Size: 3KB - Virtual size: 339KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.edata Size: 79KB - Virtual size: 150KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.edata Size: 3KB - Virtual size: 208KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 6KB - Virtual size: 223KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 139KB - Virtual size: 161KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ