Behavioral task
behavioral1
Sample
cdfdb3b43b4f533f4f76fee5f2705ab8_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
cdfdb3b43b4f533f4f76fee5f2705ab8_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
cdfdb3b43b4f533f4f76fee5f2705ab8_JaffaCakes118
-
Size
253KB
-
MD5
cdfdb3b43b4f533f4f76fee5f2705ab8
-
SHA1
6a30b9197fac93fe87b047b3f87a572994fd3fc9
-
SHA256
4df6c9cec83497f53bc862684302b4c6066cf42ff406c2f387f49b14d76751c9
-
SHA512
cad1d694f186de70ab971c734c5a5831f2c04429ef82650fc01305452d665bc4223c6796115fb4d9dd114abd5dac81278ec583999af999ddba588803e0be686d
-
SSDEEP
3072:2vgpB6Pqy06xobe4x3KDa1k3vEDU1bB3TrG3s1FfyCLt2j595k3ZCx2qAl6fIR8:2vV0WcN6t3suB3fuqqmmxk3MhAKX
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource cdfdb3b43b4f533f4f76fee5f2705ab8_JaffaCakes118
Files
-
cdfdb3b43b4f533f4f76fee5f2705ab8_JaffaCakes118.exe windows:4 windows x86 arch:x86
6002afc29f19172f9791f775c1129aef
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrlenA
WideCharToMultiByte
MultiByteToWideChar
InterlockedDecrement
GlobalFree
GlobalUnlock
lstrcpyA
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
lstrcatA
GetVersion
SetLastError
MulDiv
LocalFree
LocalAlloc
TlsAlloc
GlobalHandle
InterlockedIncrement
GlobalReAlloc
LocalReAlloc
TlsGetValue
lstrcpynA
GlobalFlags
WritePrivateProfileStringA
GetLastError
GetProcessVersion
SizeofResource
GetCPInfo
GetOEMCP
SetErrorMode
GetCurrentProcess
ReadFile
SetFilePointer
FlushFileBuffers
TlsFree
TlsSetValue
GetProfileStringA
InterlockedExchange
RtlUnwind
ExitProcess
GetTimeZoneInformation
GetSystemTime
GetLocalTime
HeapFree
HeapAlloc
RaiseException
HeapReAlloc
GetStartupInfoA
GetCommandLineA
HeapSize
GetACP
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
LCMapStringA
LCMapStringW
SetUnhandledExceptionFilter
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
SetStdHandle
CompareStringA
CompareStringW
SetEnvironmentVariableA
GlobalLock
GlobalAlloc
GlobalDeleteAtom
lstrcmpA
lstrcmpiA
GetCurrentThread
GetCurrentThreadId
GlobalMemoryStatus
GetVersionExA
GetPrivateProfileStringA
EnterCriticalSection
LeaveCriticalSection
WaitForSingleObject
GetComputerNameA
DeleteCriticalSection
InitializeCriticalSection
FreeLibrary
FindResourceA
LoadResource
LockResource
CreateFileA
WriteFile
ExpandEnvironmentStringsA
CopyFileA
CreateThread
CreateProcessA
DeleteFileA
TerminateProcess
TerminateThread
OpenProcess
Sleep
GetSystemDirectoryA
GetTickCount
LoadLibraryA
GetProcAddress
GetModuleHandleA
GetModuleFileNameA
GetTempPathA
CloseHandle
SetEndOfFile
advapi32
RegSetValueExA
RegDeleteValueA
RegCreateKeyExA
RegOpenKeyExA
RegCloseKey
RegQueryValueExA
comctl32
gdi32
GetTextExtentPointA
BitBlt
CreateCompatibleDC
CreateDIBitmap
PatBlt
SelectObject
GetClipBox
SetTextColor
SetBkColor
GetObjectA
SetBkMode
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
CreateSolidBrush
DeleteDC
SaveDC
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
IntersectClipRect
DeleteObject
GetDeviceCaps
RestoreDC
GetStockObject
CreateBitmap
mpr
WNetAddConnection3A
WNetCancelConnection2A
shell32
ShellExecuteA
user32
LoadCursorA
EndDialog
GetWindowRect
GetWindowPlacement
SystemParametersInfoA
IntersectRect
OffsetRect
RegisterWindowMessageA
GetWindow
SetForegroundWindow
GetForegroundWindow
GetMessagePos
GetMessageTime
RemovePropA
CallWindowProcA
GetPropA
UnhookWindowsHookEx
SetPropA
GetClassLongA
GetDlgCtrlID
GetWindowTextA
GetWindowTextLengthA
GetMenuItemID
GetSubMenu
GetMenuItemCount
GetMenu
GetClassInfoA
wsprintfA
WinHelpA
GetCapture
GetTopWindow
CopyRect
ScreenToClient
AdjustWindowRectEx
SetFocus
GetSysColor
MapWindowPoints
SendDlgItemMessageA
UpdateWindow
IsDialogMessageA
ShowWindow
LoadStringA
DestroyMenu
ClientToScreen
GetDC
ReleaseDC
GetWindowDC
BeginPaint
EndPaint
TabbedTextOutA
DrawTextA
GrayStringA
CreateDialogIndirectParamA
GetClassNameA
PtInRect
GetSysColorBrush
InvalidateRect
GetDlgItem
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
GetMessageA
TranslateMessage
DispatchMessageA
GetKeyState
CallNextHookEx
ValidateRect
IsWindowVisible
SetWindowsHookExA
GetLastActivePopup
SetCursor
PostQuitMessage
GetWindowLongA
DefWindowProcA
SetWindowLongA
IsWindow
UnregisterClassA
RegisterClassA
CreateWindowExA
IsWindowEnabled
GetActiveWindow
SetActiveWindow
GetParent
PeekMessageA
EnableWindow
SetWindowTextA
SetWindowPos
FindWindowExA
PostMessageA
EnumChildWindows
GetWindowThreadProcessId
CloseWindow
IsIconic
GetSystemMetrics
GetClientRect
DrawIcon
GetSystemMenu
AppendMenuA
SendMessageA
LoadIconA
MessageBoxA
FindWindowA
DestroyWindow
GetCursorPos
HideCaret
ShowCaret
ExcludeUpdateRgn
DrawFocusRect
DefDlgProcA
InflateRect
CharNextA
IsWindowUnicode
wininet
InternetOpenUrlA
InternetConnectA
InternetCrackUrlA
HttpSendRequestA
HttpOpenRequestA
InternetCloseHandle
InternetReadFile
InternetOpenA
winmm
mciSendStringA
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
ws2_32
WSASocketA
Sections
UPX0 Size: 244KB - Virtual size: 244KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.avp Size: 6KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE