Behavioral task
behavioral1
Sample
339ae4ce820cda75bbb363b2ed1c06fd_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
339ae4ce820cda75bbb363b2ed1c06fd_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
339ae4ce820cda75bbb363b2ed1c06fd_JaffaCakes118
-
Size
473KB
-
MD5
339ae4ce820cda75bbb363b2ed1c06fd
-
SHA1
62399c6102cc98ed66cbcd88a63ff870cf7b2100
-
SHA256
1e4a463ac0d463cee1f52f9529474484157c85d671aea1ab5f4173df12de01b6
-
SHA512
5da8b333a839c4b169c6f4c9a1929918f166a895af7818c8223df7ed22279aac3b6ef88f89ee083a4f475f82ec6078f8e9800a9afc9547712245d090636a284a
-
SSDEEP
6144:mMuyXQ7QiWuEKOc+/6DbhheNkOj5198kp20w1/CV2ZNYxElAb:3bQ7QiWN6D/Od19E0LLb
Malware Config
Signatures
-
Ardamax family
-
Ardamax main executable 1 IoCs
resource yara_rule sample family_ardamax -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 339ae4ce820cda75bbb363b2ed1c06fd_JaffaCakes118
Files
-
339ae4ce820cda75bbb363b2ed1c06fd_JaffaCakes118.exe windows:4 windows x86 arch:x86
4743f88b2e8d4c4a60028871fccee2bd
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
UrlUnescapeW
StrCmpIW
PathFindExtensionW
PathFindFileNameW
PathStripPathW
PathRemoveFileSpecW
StrFormatByteSizeW
PathRemoveExtensionW
StrDupW
PathFileExistsW
ws2_32
inet_addr
gethostbyname
WSAStartup
htons
WSACleanup
socket
connect
shutdown
closesocket
send
recv
getservbyname
select
comctl32
PropertySheetW
InitCommonControlsEx
ImageList_LoadImageW
ImageList_Draw
ImageList_Destroy
ImageList_ReplaceIcon
ImageList_GetImageCount
ImageList_Create
CreatePropertySheetPageW
_TrackMouseEvent
DestroyPropertySheetPage
shell32
SHChangeNotify
ShellExecuteExW
Shell_NotifyIconW
SHFileOperationW
ShellExecuteW
SHGetPathFromIDListW
SHGetSpecialFolderLocation
ExtractIconW
DoEnvironmentSubstW
wininet
InternetGetLastResponseInfoW
InternetCloseHandle
FtpPutFileW
FtpCreateDirectoryW
FtpRemoveDirectoryW
FtpDeleteFileW
FtpSetCurrentDirectoryW
InternetConnectW
InternetOpenW
mpr
WNetCancelConnection2W
WNetAddConnection2W
kernel32
GetStringTypeA
GetThreadLocale
IsProcessorFeaturePresent
InterlockedCompareExchange
SetEnvironmentVariableA
CompareStringA
GetModuleHandleW
GetCurrentProcess
GetProcAddress
LockResource
LoadLibraryW
GetVersion
VirtualAlloc
MultiByteToWideChar
FindResourceExW
FlushInstructionCache
WideCharToMultiByte
VirtualFree
FreeLibrary
GetCurrentThreadId
CreateThread
SetThreadPriority
lstrcpyW
ResumeThread
GlobalLock
GetLocalTime
LeaveCriticalSection
GlobalUnlock
SystemTimeToFileTime
CompareFileTime
CreateFileW
lstrcatW
GetSystemTimeAsFileTime
GetModuleFileNameW
EnterCriticalSection
CloseHandle
lstrcpynW
RemoveDirectoryW
GetShortPathNameW
lstrlenW
CreateDirectoryW
GetEnvironmentVariableW
WriteFile
OpenProcess
SetFileAttributesW
SetPriorityClass
CompareStringW
GetCurrentThread
DeleteFileW
Sleep
SetProcessPriorityBoost
InitializeCriticalSection
SetLastError
InterlockedIncrement
MoveFileExW
ExitProcess
RaiseException
lstrlenA
SizeofResource
lstrcmpW
lstrcpyA
lstrcmpiW
GetCurrentProcessId
InterlockedDecrement
LoadResource
FindResourceW
lstrcmpA
LoadLibraryExW
GetDateFormatW
GetVersionExW
CreateMutexW
DeleteCriticalSection
GetLastError
SetProcessWorkingSetSize
BeginUpdateResourceW
UpdateResourceW
EndUpdateResourceW
SetFilePointer
LocalFree
EnumResourceNamesW
LocalAlloc
LocalReAlloc
ReadFile
UnmapViewOfFile
SetEndOfFile
FormatMessageW
CreateToolhelp32Snapshot
Module32FirstW
Module32NextW
Process32FirstW
Process32NextW
GetWindowsDirectoryW
GetFileSize
CreateFileMappingW
MapViewOfFile
GetTimeZoneInformation
GetComputerNameW
lstrcmpiA
GetTimeFormatW
GetTickCount
OutputDebugStringW
CopyFileW
GetTempFileNameW
GetTempPathW
FileTimeToSystemTime
FileTimeToLocalFileTime
GetFileAttributesW
MoveFileW
HeapAlloc
HeapFree
HeapReAlloc
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetVersionExA
GetProcessHeap
GetStartupInfoW
GetModuleHandleA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
HeapSize
GetStdHandle
GetModuleFileNameA
HeapDestroy
HeapCreate
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
GetTimeFormatA
GetDateFormatA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
QueryPerformanceCounter
InterlockedExchange
LoadLibraryA
RtlUnwind
GetLocaleInfoA
GetConsoleCP
GetConsoleMode
LCMapStringA
LCMapStringW
VirtualQuery
GetStringTypeW
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CreateFileA
FlushFileBuffers
user32
ReleaseCapture
CheckMenuItem
GetMenuItemCount
IsWindowEnabled
MessageBoxW
GetActiveWindow
GetMenu
InflateRect
GetCapture
IsClipboardFormatAvailable
GetSubMenu
SendMessageW
OpenClipboard
GetMenuItemInfoW
DdeInitializeW
AdjustWindowRectEx
DrawFrameControl
SetCapture
ShowWindow
DdeCreateStringHandleW
SetMenuItemInfoW
GetDC
DdeConnect
DestroyIcon
DdeClientTransaction
GetClipboardData
DispatchMessageW
MapWindowPoints
SetTimer
DdeAccessData
TranslateMessage
UpdateWindow
CharLowerW
FillRect
GetMessageW
KillTimer
CloseClipboard
DrawFocusRect
DialogBoxParamW
RegisterClassExW
TrackPopupMenu
DdeDisconnect
ScreenToClient
EndDialog
DdeFreeStringHandle
IsWindow
GetDlgItemTextW
BeginPaint
DdeUninitialize
LoadMenuW
GetDlgItem
PostQuitMessage
PostMessageW
GetClassInfoExW
EndPaint
LoadIconW
InvalidateRect
SetDlgItemInt
RegisterWindowMessageW
GetWindowThreadProcessId
CallWindowProcW
GetParent
WindowFromPoint
FrameRect
PeekMessageW
SetRectEmpty
SetFocus
GetMessagePos
PtInRect
GetWindowModuleFileNameW
GetDesktopWindow
OffsetRect
GetWindowTextW
LoadImageW
GetForegroundWindow
UnhookWindowsHookEx
DefWindowProcW
DrawEdge
CopyRect
GetDlgCtrlID
GetCursorPos
GetWindowDC
MessageBeep
GetDlgItemInt
GetAncestor
IsWindowVisible
SetWindowLongW
ModifyMenuW
GetClassNameW
SetForegroundWindow
GetWindow
EnumWindows
TrackPopupMenuEx
GetClientRect
ReleaseDC
DestroyWindow
LoadStringW
GetMonitorInfoW
SendMessageTimeoutW
FindWindowW
CharNextW
MonitorFromPoint
SetCursor
RegisterHotKey
LoadCursorW
UnregisterHotKey
GetKeyState
ScrollWindow
CallNextHookEx
GetSystemMetrics
DrawTextW
GetSysColorBrush
MapVirtualKeyW
GetKeyNameTextW
wsprintfW
UnregisterClassA
SetDlgItemTextW
MoveWindow
SystemParametersInfoW
SetWindowsHookExW
GetSysColor
EnableWindow
DeleteMenu
ChangeClipboardChain
CreateWindowExW
GetWindowLongW
SetWindowPos
SetWindowTextW
GetWindowTextLengthW
DestroyMenu
SetClipboardViewer
IsMenu
GetWindowRect
GetClassLongW
GetFocus
gdi32
GetTextMetricsW
SetTextColor
CreateCompatibleBitmap
GetStockObject
CreatePen
CreatePatternBrush
GetTextExtentPoint32W
SetBrushOrgEx
TextOutW
Polygon
PatBlt
SetPolyFillMode
GetDIBits
DeleteDC
RealizePalette
CreateSolidBrush
CreateDIBSection
SetBkMode
CreateCompatibleDC
CreateRectRgnIndirect
SelectObject
CreateBitmap
CombineRgn
SetBkColor
GetObjectW
BitBlt
CreateFontIndirectW
ExcludeClipRect
CreateFontW
DeleteObject
comdlg32
GetSaveFileNameW
GetOpenFileNameW
ole32
CoTaskMemFree
CoTaskMemRealloc
CoCreateInstance
CoInitialize
CoTaskMemAlloc
CoUninitialize
oleaut32
SysFreeString
VarUI4FromStr
Sections
.text Size: 354KB - Virtual size: 354KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 62KB - Virtual size: 61KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 47KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ