Behavioral task
behavioral1
Sample
0f61050ae62c67546100a645c48e1c80_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0f61050ae62c67546100a645c48e1c80_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
0f61050ae62c67546100a645c48e1c80_JaffaCakes118
-
Size
64KB
-
MD5
0f61050ae62c67546100a645c48e1c80
-
SHA1
a7616b71c067b445f5a8c575a5a002ffc0953357
-
SHA256
7747a6b276e61424685b0bad7e952a2ae02e22d4bda7f33c24e0ad715b657aad
-
SHA512
3c881c475db32f1da0467cea490217f40121bff433bf8dbfd84cb6a087745da34e99a662bcdc5b40921244c5619af58b8f9c1a083b1c8ebd9e0bbcb3a6229d09
-
SSDEEP
1536:2CvOdVy+IKxgj3nemlGPoEExZFNzZ569+FbC23F0G8LBQdnIi0el:RvODy+Ifj3+9EP/Z569eemV8Cr
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0f61050ae62c67546100a645c48e1c80_JaffaCakes118
Files
-
0f61050ae62c67546100a645c48e1c80_JaffaCakes118.exe windows:5 windows x86 arch:x86
3a7af98744756b43274ca378b7d7444e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetPrivateProfileStringW
GetWindowsDirectoryA
WaitNamedPipeW
GlobalAlloc
GetVolumeInformationA
IsProcessorFeaturePresent
CreateProcessA
GetBinaryTypeA
ReadFile
_lwrite
GetTickCount
BackupRead
ReadFileEx
GetTempFileNameA
GetModuleFileNameA
GetStringTypeW
CloseHandle
GetTempPathA
FreeResource
OpenFile
GetConsoleOutputCP
WaitForSingleObject
GetBinaryTypeW
FindFirstChangeNotificationW
VirtualProtect
user32
IsCharUpperA
GetDC
GetKBCodePage
TrackPopupMenu
CreateDialogParamW
GetMessageTime
GetDialogBaseUnits
GetDlgItemTextA
GetKeyboardType
DdeImpersonateClient
GetSysColorBrush
wsprintfA
gdi32
ScaleViewportExtEx
SetPolyFillMode
StretchDIBits
ws2_32
htonl
WSAStartup
connect
htons
bind
socket
closesocket
gethostbyname
send
recv
shlwapi
StrStrIA
iphlpapi
GetAdaptersInfo
msvcrt
memset
memcpy
Sections
.text Size: - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.UPX0 Size: - Virtual size: 370B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.UPX1 Size: - Virtual size: 52KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
.UPX2 Size: 63KB - Virtual size: 62KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 104B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ