Behavioral task
behavioral1
Sample
bbb0ed367c5139f43b8e2a9f808bf466_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
bbb0ed367c5139f43b8e2a9f808bf466_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
bbb0ed367c5139f43b8e2a9f808bf466_JaffaCakes118
-
Size
428KB
-
MD5
bbb0ed367c5139f43b8e2a9f808bf466
-
SHA1
945a22f6089e33c9d995c23c168cd9374ac31f45
-
SHA256
5e845eb26b1fd89f6a411fdc1f1c92f3f7ba0bb45554d78dee365eb5bce15518
-
SHA512
ad64b1e4e927d7379dbd2c38e81f9407d77c2e4f858ac18a390f3aa77f6d1cf8899e6cda472dd0269abf23890ab99cdcf8381a65687dba2abfe0c1f1b1cb3521
-
SSDEEP
12288:y0Pbu8lp+rwsAXMywBLvRJaoxoKi/MlzUeEhd:y0zNlQrwsJxTRJaoxoK8MlzUeEf
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource bbb0ed367c5139f43b8e2a9f808bf466_JaffaCakes118
Files
-
bbb0ed367c5139f43b8e2a9f808bf466_JaffaCakes118.exe windows:4 windows x86 arch:x86
21c7b7c6f312ab762858ef5d9b8dd773
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetStdHandle
GetFileType
HeapAlloc
ExitProcess
TerminateProcess
HeapSize
GetTimeZoneInformation
HeapReAlloc
GetCommandLineA
LCMapStringA
LCMapStringW
SetUnhandledExceptionFilter
GetStartupInfoA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
GetEnvironmentVariableA
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetACP
IsBadReadPtr
Sleep
GetDriveTypeA
IsBadCodePtr
CompareStringA
CompareStringW
SetEnvironmentVariableA
GetLastError
ReleaseMutex
LoadLibraryA
FreeLibrary
lstrlenA
CompareFileTime
GetWindowsDirectoryA
GetVersion
FindResourceA
SizeofResource
LoadResource
LockResource
WideCharToMultiByte
lstrcpynA
GetLocaleInfoA
lstrcpyA
lstrcmpiA
CopyFileA
GetPrivateProfileStringA
GetPrivateProfileIntA
GetModuleFileNameA
MultiByteToWideChar
GetCurrentDirectoryA
InterlockedExchange
GetProfileStringA
RtlUnwind
HeapFree
RaiseException
GetProcessVersion
GetOEMCP
GetCPInfo
FileTimeToSystemTime
FindResourceExA
FileTimeToLocalFileTime
LocalReAlloc
SetErrorMode
TlsGetValue
GlobalReAlloc
TlsSetValue
EnterCriticalSection
GlobalHandle
LeaveCriticalSection
TlsFree
InitializeCriticalSection
DeleteCriticalSection
TlsAlloc
LocalAlloc
GlobalFlags
GlobalAlloc
WritePrivateProfileStringA
lstrcmpA
GetCurrentThread
GlobalAddAtomA
GetCurrentThreadId
GlobalGetAtomNameA
GlobalFindAtomA
GlobalDeleteAtom
GlobalUnlock
GlobalFree
GlobalLock
GetEnvironmentStringsW
GetFileAttributesA
MulDiv
GetModuleHandleA
GetFileTime
GetFileSize
LocalFree
GetVolumeInformationA
GetFullPathNameA
GetProcAddress
LockFile
SetEndOfFile
UnlockFile
SetFilePointer
CloseHandle
FlushFileBuffers
CreateFileA
WriteFile
ReadFile
InterlockedDecrement
GetCurrentProcess
DuplicateHandle
FindFirstFileA
InterlockedIncrement
FindNextFileA
lstrcatA
SetLastError
FindClose
SetHandleCount
CreateMutexA
GetStdHandle
IsBadWritePtr
GetStringTypeA
GetStringTypeW
user32
GetCursorPos
ValidateRect
TranslateMessage
GetMessageA
GetClassNameA
PtInRect
UnregisterClassA
LoadStringA
LoadCursorA
GetSysColorBrush
DestroyMenu
SetCursor
UpdateWindow
SendDlgItemMessageA
MapWindowPoints
PeekMessageA
DispatchMessageA
AdjustWindowRectEx
CopyRect
IsWindowVisible
GetTopWindow
MessageBoxA
WinHelpA
IsDialogMessageA
PostQuitMessage
GetMenuItemCount
GetSubMenu
GetMenuItemID
EnableMenuItem
GetWindowTextA
GetKeyState
DefWindowProcA
CreateWindowExA
SetWindowsHookExA
CallNextHookEx
SetPropA
RemovePropA
GetMessageTime
GetMessagePos
GetLastActivePopup
GetForegroundWindow
SetForegroundWindow
RegisterWindowMessageA
IntersectRect
GetWindowPlacement
GetNextDlgTabItem
EndDialog
IsWindow
CreateDialogIndirectParamA
DestroyWindow
MapDialogRect
SetWindowPos
ShowWindow
PostMessageA
GetCapture
GetActiveWindow
SetActiveWindow
GetAsyncKeyState
GetFocus
SetFocus
GetDlgItem
IsWindowEnabled
GrayStringA
DrawTextA
TabbedTextOutA
EndPaint
BeginPaint
GetWindowDC
ClientToScreen
ScreenToClient
UnhookWindowsHookEx
CharUpperA
wsprintfA
MoveWindow
CallWindowProcA
SystemParametersInfoA
GetSysColor
GetSystemMetrics
InflateRect
GetClassLongA
IsIconic
GetDC
ReleaseDC
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
GetMenu
GetClassInfoA
RegisterClassA
SetWindowTextA
IsRectEmpty
GetWindow
InvalidateRect
GetWindowLongA
SetWindowLongA
GetClientRect
OffsetRect
LoadIconA
SetRect
EnableWindow
GetWindowRect
GetParent
SendMessageA
GetWindowTextLengthA
GetPropA
GetDlgCtrlID
DrawFocusRect
ExcludeUpdateRgn
IsWindowUnicode
CharNextA
DefDlgProcA
ShowCaret
HideCaret
gdi32
CreateFontIndirectA
DeleteObject
GetTextMetricsA
CreateCompatibleDC
BitBlt
DeleteDC
PatBlt
SaveDC
RestoreDC
GetStockObject
SelectObject
SetBkMode
SetBkColor
SetTextColor
SetViewportOrgEx
OffsetViewportOrgEx
SetMapMode
ScaleViewportExtEx
SetViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
GetClipBox
EnumFontFamiliesExA
CreateSolidBrush
PtVisible
RectVisible
ExtTextOutA
Escape
TextOutA
CreateBitmap
DPtoLP
GetTextExtentPointA
CreateDIBitmap
AddFontResourceA
GetObjectA
GetDeviceCaps
IntersectClipRect
comdlg32
GetFileTitleA
winspool.drv
DocumentPropertiesA
OpenPrinterA
ClosePrinter
advapi32
RegEnumValueA
RegCloseKey
RegQueryValueExA
RegEnumKeyA
RegOpenKeyExA
RegCreateKeyA
RegCreateKeyExA
RegSetValueExA
RegDeleteKeyA
RegDeleteValueA
shell32
SHGetSpecialFolderLocation
SHGetMalloc
SHGetPathFromIDListA
comctl32
PropertySheetA
DestroyPropertySheetPage
CreatePropertySheetPageA
ord17
ImageList_Destroy
mpr
WNetEnumResourceA
WNetOpenEnumA
WNetCloseEnum
Sections
.text Size: 212KB - Virtual size: 210KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 36KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 52KB - Virtual size: 50KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.UPX0 Size: 104KB - Virtual size: 252KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE