Behavioral task
behavioral1
Sample
b7d310f32f0025de829c776581651e6b_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
b7d310f32f0025de829c776581651e6b_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b7d310f32f0025de829c776581651e6b_JaffaCakes118
-
Size
496KB
-
MD5
b7d310f32f0025de829c776581651e6b
-
SHA1
87892ab348cbe6be1bd8a628822bb9a5b9579e74
-
SHA256
74a2d68561ff04ce009c76d7e817221554f3e793f072f1bdd4e4ea6635e0564d
-
SHA512
7334791c5a1c0b5a5e1d0574e1b55a98479d4df469156044b509aabca8319dbad7aa664f7a900f9319cb2889530d6312f700f46540be50665ed7452da5d83a40
-
SSDEEP
6144:CduOpGhzXfJBU0axPEnb/jHMD3DmdYD1kSMGhuirTJwGYc8HACN:CyhzPJE4rjHIQYDSSzcirTSGf8gC
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b7d310f32f0025de829c776581651e6b_JaffaCakes118
Files
-
b7d310f32f0025de829c776581651e6b_JaffaCakes118.exe windows:4 windows x86 arch:x86
94ed805db00dcf95cfd1600738c40e20
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
dinput8
DirectInput8Create
kernel32
TerminateProcess
RtlUnwind
HeapAlloc
HeapFree
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
SetEnvironmentVariableA
SetCurrentDirectoryA
GetStartupInfoA
GetCommandLineA
HeapReAlloc
HeapSize
HeapDestroy
HeapCreate
VirtualFree
IsBadWritePtr
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
SetUnhandledExceptionFilter
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetTimeZoneInformation
IsBadReadPtr
IsBadCodePtr
SetStdHandle
ExitProcess
Sleep
GetModuleHandleA
InterlockedExchange
GetACP
GetLocaleInfoA
GetThreadLocale
GetVersionExA
MultiByteToWideChar
WideCharToMultiByte
RaiseException
GetLastError
InitializeCriticalSection
DeleteCriticalSection
SizeofResource
LockResource
LoadResource
FindResourceA
GetVersion
lstrcmpiA
lstrlenA
LeaveCriticalSection
EnterCriticalSection
FileTimeToLocalFileTime
SetErrorMode
FileTimeToSystemTime
CreateFileA
GetFullPathNameA
GetCurrentProcess
SetEndOfFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
LocalFree
FormatMessageA
GetSystemDirectoryA
GetDriveTypeA
CompareStringA
CompareStringW
CreateProcessA
GetCurrentDirectoryA
GetOEMCP
GetCPInfo
InterlockedIncrement
GlobalFlags
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
TlsGetValue
GlobalHandle
GlobalReAlloc
LocalAlloc
InterlockedDecrement
MulDiv
GetPrivateProfileStringA
WritePrivateProfileStringA
GetPrivateProfileIntA
GlobalUnlock
SetLastError
GlobalFree
CloseHandle
GetCurrentThread
GlobalLock
GlobalAlloc
lstrcmpA
GetModuleFileNameA
ConvertDefaultLocale
EnumResourceLanguagesA
lstrcpyA
FreeResource
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
LoadLibraryA
FreeLibrary
lstrcatA
lstrcmpW
lstrcpynA
GetProcAddress
CreateMutexA
ReleaseMutex
DeleteFileA
FindFirstFileA
FindNextFileA
FindClose
user32
GetSysColorBrush
DestroyMenu
EndPaint
BeginPaint
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
wsprintfA
ReleaseDC
GetDC
CreateDialogIndirectParamA
GetNextDlgTabItem
EndDialog
GetMessageA
TranslateMessage
GetCursorPos
ValidateRect
SetCursor
SetMenuItemBitmaps
ModifyMenuA
GetMenuState
EnableMenuItem
CheckMenuItem
GetMenuCheckMarkDimensions
LoadBitmapA
IsWindowEnabled
IsDialogMessageA
IsDlgButtonChecked
CheckRadioButton
CheckDlgButton
RegisterWindowMessageA
WinHelpA
GetCapture
CreateWindowExA
CallNextHookEx
GetClassLongA
GetClassInfoExA
GetClassNameA
SetPropA
GetPropA
RemovePropA
SendDlgItemMessageA
IsWindow
SetFocus
GetWindowTextA
GetForegroundWindow
GetLastActivePopup
SetActiveWindow
DispatchMessageA
GetTopWindow
DestroyWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
PeekMessageA
MapWindowPoints
GetKeyState
IsWindowVisible
UpdateWindow
GetMenu
PostMessageA
GetSubMenu
GetMenuItemID
GetMenuItemCount
GetSysColor
AdjustWindowRectEx
GetParent
GetClassInfoA
RegisterClassA
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
GetWindowLongA
SetWindowLongA
SystemParametersInfoA
GetWindowPlacement
CopyRect
PtInRect
GetWindow
FindWindowExA
BringWindowToTop
SetForegroundWindow
LoadCursorA
SetWindowTextA
SetWindowsHookExA
SetWindowPos
ShowWindow
UnregisterClassA
GetDialogBaseUnits
GetDlgItem
PostQuitMessage
GetSystemMetrics
MessageBoxA
LoadIconA
GetDesktopWindow
SetTimer
InvalidateRect
GetClientRect
GetWindowRect
IsIconic
DrawIcon
GetActiveWindow
MapVirtualKeyA
SendMessageA
EnableWindow
GetFocus
gdi32
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
GetStockObject
SetMapMode
RestoreDC
SaveDC
GetDeviceCaps
CreateBitmap
SetBkColor
SetTextColor
GetClipBox
CreateDIBSection
GetPixel
DeleteObject
SetPixel
GetObjectA
SetDIBColorTable
SelectObject
DeleteDC
CreateCompatibleDC
comdlg32
GetOpenFileNameA
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
RegQueryValueExA
RegCreateKeyA
RegOpenKeyExA
RegDeleteKeyA
RegEnumKeyA
RegOpenKeyA
RegQueryValueA
RegCreateKeyExA
RegSetValueExA
RegDeleteValueA
RegCloseKey
comctl32
ord17
ImageList_Destroy
shlwapi
PathFindFileNameA
PathFindExtensionA
oleaut32
VariantClear
VariantChangeType
VariantInit
gdiplus
GdipGetImagePaletteSize
GdipGetImagePixelFormat
GdipGetImagePalette
GdipGetImageWidth
GdipCreateBitmapFromFile
GdipCreateBitmapFromFileICM
GdipCreateBitmapFromScan0
GdipBitmapLockBits
GdipBitmapUnlockBits
GdiplusStartup
GdiplusShutdown
GdipFree
GdipGetImageGraphicsContext
GdipDrawImageI
GdipAlloc
GdipCloneImage
GdipGetImageHeight
GdipDeleteGraphics
GdipDisposeImage
Sections
.text Size: 144KB - Virtual size: 143KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 40KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 91KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 192KB - Virtual size: 191KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.UPX0 Size: 104KB - Virtual size: 252KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE