Behavioral task
behavioral1
Sample
10d0df15dfcf996a28d09e6b5082569f_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
10d0df15dfcf996a28d09e6b5082569f_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
10d0df15dfcf996a28d09e6b5082569f_JaffaCakes118
-
Size
93KB
-
MD5
10d0df15dfcf996a28d09e6b5082569f
-
SHA1
10565f47ab005664f0531ff28d1600e67d90ecb1
-
SHA256
ac9e191e2b6959222fba014451b8686530e31e175136353752b2010de9fccc1d
-
SHA512
0477a031c14f045c60f61895be69b3b09b1f94b5b14f09c348c7980871b03e21f1ab7ebef3ad6a958bc381515b0050ca12f1e534c8ee3631e52a29d1979c274f
-
SSDEEP
1536:EbCdvjA45SwDpu2w7QcnPr4MdFn/z8eRIyfqnVz3R:EbiUYSKeQP4nL87QqVz3R
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 10d0df15dfcf996a28d09e6b5082569f_JaffaCakes118
Files
-
10d0df15dfcf996a28d09e6b5082569f_JaffaCakes118.exe windows:4 windows x86 arch:x86
44091d7be10ea39e196407bccb1698ad
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
MultiByteToWideChar
GetPrivateProfileIntA
GetPrivateProfileStringA
WritePrivateProfileStringA
WideCharToMultiByte
FindClose
ReadProcessMemory
GetCurrentProcess
ExitProcess
OpenProcess
GlobalAlloc
GlobalLock
ReadFile
GlobalUnlock
FindFirstFileA
FindNextFileA
GetFileAttributesA
GetVersionExA
GetModuleFileNameA
GetTempPathA
GetWindowsDirectoryA
GetTempFileNameA
GetVolumeInformationA
GetFileSize
GetCurrentProcessId
CloseHandle
DeleteFileA
EnumResourceNamesA
FreeLibrary
GetStartupInfoA
GetProcAddress
GetModuleHandleA
LoadLibraryA
SetFilePointer
LocalFree
FormatMessageA
LoadLibraryExA
CreateFileA
WriteFile
GetLastError
advapi32
RegSetValueExA
RegDeleteValueA
RegDeleteKeyA
RegEnumKeyExA
RegCreateKeyExA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
comctl32
ImageList_Create
ImageList_ReplaceIcon
ImageList_Replace
CreateToolbarEx
ImageList_AddMasked
ImageList_SetImageCount
comdlg32
GetSaveFileNameA
gdi32
CreateFontIndirectA
SetBkMode
SetTextColor
GetDeviceCaps
SetBkColor
GetTextExtentPoint32A
DeleteObject
msvcrt
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
_onexit
__dllonexit
strncmp
_strnicmp
memcmp
strtoul
atoi
strcmp
_ftol
_ultoa
strchr
strrchr
memset
free
malloc
??2@YAPAXI@Z
??3@YAXPAX@Z
memcpy
__CxxFrameHandler
_purecall
strcpy
_except_handler3
strlen
strncat
strcat
_itoa
_strcmpi
_memicmp
_strlwr
sprintf
_controlfp
__set_app_type
shell32
SHGetPathFromIDListA
SHBrowseForFolderA
SHGetMalloc
ShellExecuteA
user32
CopyRect
GetSystemMetrics
DefWindowProcA
RegisterClassA
DispatchMessageA
TrackPopupMenu
SetWindowPos
GetWindowPlacement
SetDlgItemTextA
IsDialogMessageA
GetDlgItem
SetWindowTextA
RegisterWindowMessageA
BeginDeferWindowPos
DeferWindowPos
EnableMenuItem
SetRect
MapDialogRect
SetFocus
SetWindowLongA
GetWindowLongA
LoadIconA
TranslateAcceleratorA
LoadAcceleratorsA
PostMessageA
GetMessageA
PostQuitMessage
TranslateMessage
EndDeferWindowPos
GetWindowRect
GetDlgItemTextA
DestroyIcon
SetMenu
MessageBoxA
ChildWindowFromPoint
LoadCursorA
DestroyMenu
DestroyWindow
GetWindowTextA
CreateDialogParamA
DialogBoxParamA
GetDlgCtrlID
GetSubMenu
GetParent
LoadMenuA
GetMenuItemInfoA
ModifyMenuA
UpdateWindow
ShowWindow
LoadImageA
GetMenuItemCount
MoveWindow
MapWindowPoints
GetMenuStringA
GetClientRect
GetClassNameA
GetCursorPos
GetDC
ReleaseDC
OpenClipboard
EmptyClipboard
SetClipboardData
CloseClipboard
CheckMenuItem
GetMenu
CreateWindowExA
EndDialog
SetCursor
GetSysColorBrush
SendMessageA
GetSysColor
LoadStringA
EnumChildWindows
Sections
UPX0 Size: 84KB - Virtual size: 84KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.avc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE