Behavioral task
behavioral1
Sample
1647d11bb2df60812b536cdb4c1d0aef_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1647d11bb2df60812b536cdb4c1d0aef_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
1647d11bb2df60812b536cdb4c1d0aef_JaffaCakes118
-
Size
53KB
-
MD5
1647d11bb2df60812b536cdb4c1d0aef
-
SHA1
86f416f2e713b6b269068b8026337aa671568be9
-
SHA256
d1824cbd28d79bec33f774937e3d2e0a959ab2fbebb85f91d4e1d5b20918dbbd
-
SHA512
fd7395d71173f76e9105735abc9d680df76a463935d54bfb89b6e61d6496adada8f4009496a554360b2063f9b78f5371957338deb6c8f2e022900d5c795da0be
-
SSDEEP
1536:bV31khbVFfqbVeKJqgoYu/zq4N6rfEinekK/p6f/kC:bV31k3uVeiXruDg7beLRoP
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1647d11bb2df60812b536cdb4c1d0aef_JaffaCakes118
Files
-
1647d11bb2df60812b536cdb4c1d0aef_JaffaCakes118.exe windows:5 windows x86 arch:x86
44ef8861794c136b7e935617b97f411d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GlobalAlloc
GetVolumeInformationA
VerifyVersionInfoA
CreateProcessA
GetBinaryTypeA
ReadFile
DefineDosDeviceA
_lcreat
GetWindowsDirectoryA
GetModuleFileNameA
WriteProfileStringA
FillConsoleOutputAttribute
CloseHandle
GetTempPathA
WaitForSingleObject
_lwrite
GetDiskFreeSpaceW
GetTickCount
TlsGetValue
GetTempFileNameA
OpenFile
VirtualProtect
user32
FindWindowW
wsprintfA
AttachThreadInput
ChangeDisplaySettingsExW
ImpersonateDdeClientWindow
MessageBoxA
GetKeyboardLayoutNameW
DdeConnectList
GetDesktopWindow
OpenWindowStationW
ActivateKeyboardLayout
mouse_event
SetLastErrorEx
OemKeyScan
WinHelpW
CharUpperW
GetUpdateRect
gdi32
TextOutA
UnrealizeObject
Ellipse
GetMetaFileBitsEx
ws2_32
htonl
WSAStartup
connect
htons
recv
bind
socket
gethostbyname
send
closesocket
shlwapi
StrStrIA
iphlpapi
GetAdaptersInfo
msvcrt
memset
memcpy
Sections
.text Size: - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.UPX0 Size: - Virtual size: 380B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.UPX1 Size: - Virtual size: 42KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
.UPX2 Size: 51KB - Virtual size: 51KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 52B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ