export_main
Behavioral task
behavioral1
Sample
d54a4ae20376a9b6f0fd9c744d86fa1b_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d54a4ae20376a9b6f0fd9c744d86fa1b_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d54a4ae20376a9b6f0fd9c744d86fa1b_JaffaCakes118
-
Size
379KB
-
MD5
d54a4ae20376a9b6f0fd9c744d86fa1b
-
SHA1
0cccb0b502c24c7e7f032b9ed825bc0c507d815e
-
SHA256
f15c2f7e50a1549dfb202e55daa7765112260ebce8cd212a211de934bc2cbdc3
-
SHA512
4bef28d18f2def04485fe35b6a97ff8e114311d6a6b5c48ad3d2b62631db31a5d40b50f3ee1f402acd3e257e92b4a5f10aa39816df34c64f2f184d1e9eb5c027
-
SSDEEP
6144:HLauwkMixypuDgmi8+9TvyCuo4+HnXonAOBf7O0c+2aM:HxMixy1mgT34nAa7O8
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d54a4ae20376a9b6f0fd9c744d86fa1b_JaffaCakes118
Files
-
d54a4ae20376a9b6f0fd9c744d86fa1b_JaffaCakes118.exe windows:4 windows x86 arch:x86
12c0dc836acd6c848eae1241e9fdbc8f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetSystemTime
GetCurrentThreadId
OpenFileMappingA
MapViewOfFile
UnmapViewOfFile
GetCurrentProcessId
SetPriorityClass
GetVolumeInformationA
GetProcessTimes
GetExitCodeThread
WaitForMultipleObjects
WideCharToMultiByte
lstrcmpiA
WinExec
SetFileAttributesA
GetDriveTypeA
GetLogicalDriveStringsA
RemoveDirectoryA
CreateProcessA
CreatePipe
GetExitCodeProcess
GlobalReAlloc
LoadLibraryExA
SetFilePointer
CreateDirectoryA
GetWindowsDirectoryA
FileTimeToSystemTime
SetFileTime
LocalFileTimeToFileTime
SystemTimeToFileTime
GlobalAlloc
GlobalFree
GlobalUnlock
GlobalLock
GlobalMemoryStatus
GlobalSize
CopyFileA
GetTempFileNameA
GetShortPathNameA
ExitProcess
GetTempPathA
GetCommandLineA
LocalAlloc
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
CreateIoCompletionPort
GetQueuedCompletionStatus
GetOverlappedResult
OutputDebugStringA
FindFirstFileA
GetFileSize
FindNextFileA
FindClose
SetThreadPriority
ResumeThread
SuspendThread
TerminateThread
GetCurrentDirectoryA
ResetEvent
MultiByteToWideChar
WaitForSingleObject
CreateEventA
SetEvent
CreateThread
DuplicateHandle
WriteFile
PeekNamedPipe
ReadFile
TerminateProcess
GetModuleFileNameA
SetConsoleCtrlHandler
LocalFree
BeginUpdateResourceA
UpdateResourceA
EndUpdateResourceA
FreeLibrary
GetModuleHandleA
LoadResource
SizeofResource
LockResource
FindResourceExA
EnumResourceLanguagesA
CreateToolhelp32Snapshot
Process32First
Process32Next
LoadLibraryA
GetProcAddress
GetVersion
GetCurrentProcess
SetLastError
FormatMessageA
GetLocalTime
GetVersionExA
GetSystemInfo
GetLastError
GetTickCount
CloseHandle
Sleep
CreateFileA
DeviceIoControl
GetSystemDirectoryA
DeleteFileA
ReadProcessMemory
WriteProcessMemory
VirtualProtectEx
OpenProcess
advapi32
OpenServiceA
RegEnumKeyA
RegQueryInfoKeyA
RegSaveKeyA
RegDeleteKeyA
RegRestoreKeyA
RegEnumKeyExA
RegEnumValueA
RegQueryValueExA
RegSetValueExA
RegDeleteValueA
CloseServiceHandle
UnlockServiceDatabase
CreateServiceA
LockServiceDatabase
OpenSCManagerA
StartServiceA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
DeregisterEventSource
ChangeServiceConfig2A
DeleteService
StartServiceCtrlDispatcherA
RegisterServiceCtrlHandlerA
SetServiceStatus
QueryServiceStatus
RegCreateKeyExA
RegOpenKeyExA
GetSidSubAuthority
GetSidSubAuthorityCount
GetSidIdentifierAuthority
FreeSid
LookupAccountSidA
AllocateAndInitializeSid
LookupAccountNameA
InitiateSystemShutdownA
RegCloseKey
gdi32
GetObjectA
GetStockObject
SelectPalette
RealizePalette
GetDIBits
CreateDCA
CreateCompatibleDC
CreateCompatibleBitmap
SelectObject
BitBlt
DeleteObject
mfc42
mpr
WNetAddConnection2A
WNetCancelConnection2A
msvcp60
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??1out_of_range@std@@UAE@XZ
??0out_of_range@std@@QAE@ABV01@@Z
??0out_of_range@std@@QAE@ABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@1@@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
??_7out_of_range@std@@6B@
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
??0logic_error@std@@QAE@ABV01@@Z
msvcrt
wcstombs
_mbsicmp
strncpy
__CxxFrameHandler
strlen
memset
memcpy
strchr
atoi
rand
printf
strcat
strncat
strcpy
strcmp
_purecall
_snprintf
sprintf
wcslen
wcscmp
fclose
fwrite
fopen
wcscpy
fgetc
fread
fseek
_mbscmp
_controlfp
_strlwr
_strnicmp
isalnum
_vsnprintf
??0exception@@QAE@ABV0@@Z
??1exception@@UAE@XZ
??0exception@@QAE@ABQBD@Z
strstr
fgets
sscanf
free
realloc
memmove
malloc
rename
?terminate@@YAXXZ
fprintf
_iob
strncmp
getenv
_stricmp
srand
time
_except_handler3
_CxxThrowException
swprintf
__dllonexit
_onexit
_exit
_XcptFilter
exit
__p___initenv
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
??1type_info@@UAE@XZ
_wcsicmp
netapi32
NetApiBufferFree
NetUserGetInfo
NetQueryDisplayInformation
ole32
CoInitialize
oleaut32
psapi
GetModuleFileNameExA
GetProcessMemoryInfo
shell32
ShellExecuteA
SHGetFileInfoA
shlwapi
SHDeleteValueA
SHDeleteKeyA
user32
OpenWindowStationA
SetThreadDesktop
GetProcessWindowStation
GetSystemMetrics
ReleaseDC
GetWindowRect
GetWindowDC
GetDC
SetProcessWindowStation
CloseDesktop
EnumDesktopsA
SendMessageA
GetWindowLongA
TranslateMessage
DispatchMessageA
SetWindowLongA
DestroyWindow
CloseWindowStation
OpenDesktopA
PeekMessageA
GetDesktopWindow
CreateWindowExA
GetThreadDesktop
PostMessageA
wsprintfA
MessageBoxA
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
VerFindFileA
ws2_32
Exports
Exports
Sections
UPX0 Size: 368KB - Virtual size: 368KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.avp Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE