Behavioral task
behavioral1
Sample
JaffaCakes118_f9b3264ecbd6959066b61505b6538f93.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_f9b3264ecbd6959066b61505b6538f93.exe
Resource
win10v2004-20250211-en
General
-
Target
JaffaCakes118_f9b3264ecbd6959066b61505b6538f93
-
Size
266KB
-
MD5
f9b3264ecbd6959066b61505b6538f93
-
SHA1
75ac66b305c499561d9c5c0880b2582a163f5fcf
-
SHA256
1022e2aad73289b4ac92b1394d12e404a9310c0bea95a6764291205d5d5445d1
-
SHA512
5f80e474c4a5a962c5aef1fcf8437c1dc1ceb905fe30927d81227b0c1315a6144d08d6e2f181a7f50e7ba9439b8a19837198bf876db02540ff3959b8f2e58e89
-
SSDEEP
3072:VW/1lqNqAoPJl+Q7fFOPLfie9rHbK5pWsl8bnDZNnZRfs6pCWtKU7xTVKpfo5Utn:4rDPSgFCqiXIQ28bDr5trKpfo5aoo
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource JaffaCakes118_f9b3264ecbd6959066b61505b6538f93
Files
-
JaffaCakes118_f9b3264ecbd6959066b61505b6538f93.exe windows:4 windows x86 arch:x86
54e009db0d04ac6413ca63a9073a239c
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleFileNameW
GetLastError
GetTickCount
GetCurrentProcess
MultiByteToWideChar
GetSystemDirectoryW
GetVersionExA
GetProcessHeap
GetStartupInfoW
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
GetModuleHandleA
TlsAlloc
GetCurrentThreadId
HeapCreate
ExitProcess
GetModuleFileNameA
GetEnvironmentStringsW
GetStartupInfoA
QueryPerformanceCounter
GetCurrentProcessId
GetStringTypeA
GetStringTypeW
Sleep
GetLocaleInfoA
InitializeCriticalSection
LoadLibraryA
BeginUpdateResourceW
GetProcAddress
user32
GetSystemMetrics
EnableMenuItem
mouse_event
PostMessageW
LoadMenuIndirectA
IsMenu
SetCursor
DestroyCursor
GetMenuItemID
wvsprintfA
GetMenuInfo
UnregisterClassA
GetScrollPos
FindWindowW
EnableWindow
GetClassInfoExA
CreateAcceleratorTableW
GetIconInfo
keybd_event
SetWindowPos
CreatePopupMenu
CreateMenu
GetCapture
SetDlgItemTextA
GetDlgItemTextW
EnumClipboardFormats
CharLowerA
GetSysColorBrush
CreateDialogParamW
PeekMessageA
AppendMenuA
MonitorFromWindow
advapi32
RegSetValueExW
RegCloseKey
RegCreateKeyExW
RegOpenKeyExW
RegDeleteKeyW
CloseServiceHandle
StartServiceW
OpenServiceW
OpenSCManagerW
resutils
ResUtilGetProperty
ResUtilVerifyPropertyTable
ResUtilVerifyResourceService
ResUtilGetBinaryValue
ResUtilSetPropertyParameterBlock
ResUtilFindDependentDiskResourceDriveLetter
ResUtilGetProperties
ResUtilSetPropertyParameterBlockEx
ResUtilGetPropertySize
ResUtilGetAllProperties
ResUtilIsResourceClassEqual
ResUtilVerifyService
ResUtilFindDwordProperty
ResUtilGetResourceDependency
ResUtilSetResourceServiceStartParameters
gdi32
CreateDIBSection
GetMetaFileA
CreateBrushIndirect
GetRasterizerCaps
AddFontResourceA
UpdateICMRegKeyA
GetStockObject
d3d8thk
OsThunkDdGetBltStatus
OsThunkDdDestroyMoComp
OsThunkDdCreateMoComp
OsThunkDdGetDriverInfo
OsThunkDdUnlockD3D
OsThunkDdGetDxHandle
OsThunkDdGetDC
Sections
.text Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.idata Size: 3KB - Virtual size: 54KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
CODE Size: 3KB - Virtual size: 243KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 3KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
UPX0 Size: 5KB - Virtual size: 145KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 91KB - Virtual size: 171KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 278KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 233KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 130KB - Virtual size: 175KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
UPX1 Size: 2KB - Virtual size: 406KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ