Behavioral task
behavioral1
Sample
7a063c0f89727c224767413d1ff8aa33_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
7a063c0f89727c224767413d1ff8aa33_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
7a063c0f89727c224767413d1ff8aa33_JaffaCakes118
-
Size
513KB
-
MD5
7a063c0f89727c224767413d1ff8aa33
-
SHA1
4d9e46df9a26e6df1c993d3335ead6fe6e0bb7aa
-
SHA256
fb0b453a48bad0296d8ea8b554f8172224a3d6f41c6ebd5a9ea5ac0c970f3ed8
-
SHA512
6c6a0cbcb921adf5272b9f2eb08b7a100728d356adc3334c8b49f002f651fcf808cb4b6e7526b0aad9eeac0a0875af4ceeac6d3dfbbe1551046ff64d6c601c0c
-
SSDEEP
6144:XkIahY1erZBfqalnScbMpmiYTEhkr6km7iADo/+V0NM/CAfr:XqY1er/nScw/uekrtAXj
Malware Config
Signatures
-
Ardamax family
-
Ardamax main executable 1 IoCs
Processes:
resource yara_rule sample family_ardamax -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 7a063c0f89727c224767413d1ff8aa33_JaffaCakes118
Files
-
7a063c0f89727c224767413d1ff8aa33_JaffaCakes118.exe windows:4 windows x86 arch:x86
5628816c76062b9cd4f1e4fb29de3027
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
UrlUnescapeW
StrDupW
PathRemoveFileSpecW
PathFileExistsW
PathRemoveExtensionW
PathFindExtensionW
PathFindFileNameW
StrFormatByteSizeW
StrCmpIW
PathStripPathW
ws2_32
recv
send
WSAStartup
htons
WSACleanup
getservbyname
inet_addr
gethostbyname
socket
closesocket
shutdown
select
connect
comctl32
ImageList_Destroy
ImageList_Create
CreatePropertySheetPageW
PropertySheetW
_TrackMouseEvent
DestroyPropertySheetPage
ImageList_LoadImageW
ImageList_Draw
InitCommonControlsEx
ImageList_ReplaceIcon
ImageList_GetImageCount
shell32
DoEnvironmentSubstW
Shell_NotifyIconW
SHFileOperationW
SHGetPathFromIDListW
SHGetSpecialFolderLocation
ShellExecuteW
SHChangeNotify
ExtractIconW
ShellExecuteExW
wininet
InternetGetLastResponseInfoW
InternetOpenW
InternetCloseHandle
FtpPutFileW
FtpCreateDirectoryW
FtpRemoveDirectoryW
FtpDeleteFileW
FtpSetCurrentDirectoryW
InternetConnectW
mpr
WNetCancelConnection2W
WNetAddConnection2W
kernel32
LCMapStringW
GetThreadLocale
IsProcessorFeaturePresent
InterlockedCompareExchange
SetEnvironmentVariableA
CompareStringA
Sleep
SetProcessPriorityBoost
EnterCriticalSection
lstrcpyW
MoveFileExW
ExitProcess
CloseHandle
GetCurrentProcessId
CompareStringW
WriteFile
InitializeCriticalSection
lstrlenW
CreateMutexW
CreateFileW
InterlockedIncrement
GetLastError
SetProcessWorkingSetSize
RaiseException
lstrcmpiW
GetCurrentProcess
SizeofResource
InterlockedDecrement
LoadResource
GetVersionExW
DeleteFileW
lstrlenA
FindResourceW
GetDateFormatW
SetLastError
lstrcpyA
LoadLibraryExW
VirtualAlloc
lstrcmpA
VirtualFree
DeleteCriticalSection
GetUserDefaultLangID
CreateThread
SetThreadPriority
lstrcmpW
ResumeThread
LockResource
GlobalLock
GetLocalTime
GlobalUnlock
SystemTimeToFileTime
LoadLibraryW
CompareFileTime
FindResourceExW
FlushInstructionCache
GetCurrentThreadId
GetVersion
GetModuleHandleW
lstrcatW
MultiByteToWideChar
GetProcAddress
GetSystemTimeAsFileTime
GetModuleFileNameW
WideCharToMultiByte
lstrcpynW
RemoveDirectoryW
GetShortPathNameW
FreeLibrary
CreateDirectoryW
GetEnvironmentVariableW
LeaveCriticalSection
OpenProcess
SetFileAttributesW
SetPriorityClass
GetCurrentThread
EnumResourceNamesW
LocalAlloc
LocalReAlloc
ReadFile
BeginUpdateResourceW
UpdateResourceW
EndUpdateResourceW
SetFilePointer
LocalFree
Module32FirstW
Module32NextW
Process32FirstW
Process32NextW
GetWindowsDirectoryW
GetFileSize
CreateFileMappingW
MapViewOfFile
UnmapViewOfFile
SetEndOfFile
FormatMessageW
CreateToolhelp32Snapshot
OutputDebugStringW
GetTimeZoneInformation
GetComputerNameW
lstrcmpiA
GetTimeFormatW
GetTickCount
CopyFileW
GetTempFileNameW
GetTempPathW
FileTimeToLocalFileTime
FileTimeToSystemTime
GetFileAttributesW
MoveFileW
HeapFree
HeapAlloc
HeapReAlloc
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetVersionExA
GetProcessHeap
GetStartupInfoW
HeapDestroy
HeapCreate
GetModuleHandleA
GetStdHandle
GetModuleFileNameA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
HeapSize
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
GetTimeFormatA
GetDateFormatA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
QueryPerformanceCounter
RtlUnwind
InterlockedExchange
LoadLibraryA
GetConsoleCP
GetConsoleMode
GetLocaleInfoA
LCMapStringA
VirtualQuery
GetStringTypeA
GetStringTypeW
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CreateFileA
FlushFileBuffers
user32
BeginPaint
GetWindow
LoadIconW
InvalidateRect
SetDlgItemInt
GetDlgItem
EnumWindows
CallWindowProcW
WindowFromPoint
FrameRect
PeekMessageW
KillTimer
SetRectEmpty
UnhookWindowsHookEx
CopyRect
EndPaint
GetParent
GetMessagePos
PtInRect
SendMessageTimeoutW
FindWindowW
OffsetRect
GetFocus
GetDlgItemTextW
RegisterHotKey
DrawEdge
UnregisterHotKey
PostMessageW
SetWindowLongW
MessageBeep
TrackPopupMenuEx
SetFocus
GetMonitorInfoW
MonitorFromPoint
LoadImageW
ReleaseDC
SetClipboardViewer
DestroyWindow
GetWindowTextLengthW
GetDlgItemInt
CharNextW
SetCursor
CallNextHookEx
GetSystemMetrics
ChangeClipboardChain
GetWindowTextW
LoadCursorW
GetKeyState
SetWindowsHookExW
GetSysColor
IsClipboardFormatAvailable
SendMessageW
DrawTextW
GetSysColorBrush
OpenClipboard
DdeInitializeW
SystemParametersInfoW
DdeCreateStringHandleW
DdeConnect
SetDlgItemTextW
DdeClientTransaction
GetClipboardData
DdeAccessData
GetClassLongW
DispatchMessageW
IsMenu
GetClientRect
TranslateMessage
DestroyMenu
SetWindowPos
GetWindowLongW
GetClassInfoExW
GetMessageW
DeleteMenu
CloseClipboard
ReleaseCapture
DdeDisconnect
CheckMenuItem
IsWindowEnabled
EndDialog
DdeFreeStringHandle
IsWindow
GetMenu
InflateRect
GetCapture
DdeUninitialize
GetSubMenu
GetMenuItemCount
ScrollWindow
PostQuitMessage
MapWindowPoints
TrackPopupMenu
AdjustWindowRectEx
DrawFrameControl
SetCapture
SetWindowTextW
GetMenuItemInfoW
MoveWindow
RegisterWindowMessageW
GetWindowThreadProcessId
FillRect
EnableWindow
SetMenuItemInfoW
GetActiveWindow
CharLowerW
GetWindowRect
GetWindowModuleFileNameW
GetDesktopWindow
ModifyMenuW
DestroyIcon
UpdateWindow
wsprintfW
MapVirtualKeyW
GetKeyNameTextW
UnregisterClassA
GetCursorPos
GetForegroundWindow
ShowWindow
GetDlgCtrlID
GetWindowDC
SetForegroundWindow
SetTimer
MessageBoxW
GetClassNameW
GetDC
LoadMenuW
IsWindowVisible
GetAncestor
ScreenToClient
DefWindowProcW
DrawFocusRect
DialogBoxParamW
RegisterClassExW
CreateWindowExW
gdi32
CreateDIBSection
SetBkMode
CreateCompatibleDC
CreateRectRgnIndirect
SelectObject
CreateBitmap
SetBkColor
BitBlt
ExcludeClipRect
CreateFontW
GetObjectW
CreateFontIndirectW
GetDIBits
SetPolyFillMode
RealizePalette
CombineRgn
DeleteDC
DeleteObject
GetTextMetricsW
SetTextColor
CreateCompatibleBitmap
GetStockObject
CreatePatternBrush
CreateSolidBrush
GetTextExtentPoint32W
CreatePen
SetBrushOrgEx
TextOutW
Polygon
PatBlt
comdlg32
GetSaveFileNameW
GetOpenFileNameW
ole32
CoTaskMemRealloc
CoInitialize
CoUninitialize
CoTaskMemFree
CoCreateInstance
CoTaskMemAlloc
oleaut32
SysFreeString
VarUI4FromStr
Sections
.text Size: 365KB - Virtual size: 364KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 54KB - Virtual size: 54KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 8KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 84KB - Virtual size: 160KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE