Behavioral task
behavioral1
Sample
27b564a28c1c5a7926d09f5d21812621_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
27b564a28c1c5a7926d09f5d21812621_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
27b564a28c1c5a7926d09f5d21812621_JaffaCakes118
-
Size
264KB
-
MD5
27b564a28c1c5a7926d09f5d21812621
-
SHA1
a1d20479306e0d09f3c431168dd4bef7fa0b6855
-
SHA256
a6349979fc19a098ecb1d338b42393049abb4db68c9b126e196d66844f601606
-
SHA512
b9117a887abf242cb21b6b7e859d1cc37efe03c65f7b598a08f5512dc6a55492290c850a85e8bea64ab209f7cc4654282bcc67bf42e1137bd4fb336656f7217d
-
SSDEEP
6144:IzrlhmQ7+nXEM9ySWwhramZzH5/B/6Tc3g/D:Ifm/X/I4raozZ/q
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 27b564a28c1c5a7926d09f5d21812621_JaffaCakes118
Files
-
27b564a28c1c5a7926d09f5d21812621_JaffaCakes118.exe windows:4 windows x86 arch:x86
b58312f5f24957d8637f566c85dd603c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
wsock32
ntohs
ntohl
recv
socket
htons
connect
send
ioctlsocket
closesocket
WSAStartup
WSACleanup
WSAGetLastError
WSASetLastError
htonl
kernel32
IsBadCodePtr
IsBadReadPtr
lstrlenA
GetLastError
CreateFileA
SetFileTime
FlushFileBuffers
WriteFile
CloseHandle
GetTempPathA
GetCurrentDirectoryA
GetModuleFileNameA
GetSystemDirectoryA
GetExitCodeProcess
WaitForSingleObject
CreateProcessA
OpenProcess
GetVersionExA
WritePrivateProfileStringA
GetWindowsDirectoryA
GetTempFileNameA
FindClose
FindFirstFileA
IsDBCSLeadByte
lstrcpynA
MoveFileExA
GetPrivateProfileStringA
DeleteFileA
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
SetStdHandle
DebugBreak
ReadFile
SetErrorMode
GetStdHandle
DisconnectNamedPipe
FreeLibrary
GetProcAddress
LoadLibraryA
CreateMutexA
OpenMutexA
ReleaseMutex
GetModuleHandleA
LocalFree
CreateDirectoryA
LocalAlloc
GetFileAttributesA
DuplicateHandle
GetCurrentProcess
CreatePipe
Sleep
GlobalFree
GlobalAlloc
GetComputerNameA
VirtualQuery
InterlockedExchange
LCMapStringW
LCMapStringA
GetStringTypeW
MultiByteToWideChar
GetStringTypeA
VirtualProtect
GetSystemInfo
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
SetEndOfFile
GetLocaleInfoW
LeaveCriticalSection
IsValidCodePage
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
HeapAlloc
HeapFree
GetStartupInfoA
GetCommandLineA
RtlUnwind
RaiseException
ExitProcess
TerminateProcess
GetSystemTimeAsFileTime
GetACP
GetOEMCP
GetCPInfo
TlsAlloc
SetLastError
GetCurrentThreadId
TlsFree
TlsSetValue
TlsGetValue
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
IsBadWritePtr
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapSize
SetUnhandledExceptionFilter
SetFilePointer
GetUserDefaultLCID
user32
GetActiveWindow
GetWindowLongA
GetParent
MessageBoxA
FindWindowA
GetWindowThreadProcessId
advapi32
SetSecurityDescriptorDacl
RegCreateKeyA
RegOpenKeyA
RegSetValueExA
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
AllocateAndInitializeSid
InitializeSecurityDescriptor
FreeSid
OpenProcessToken
CreateProcessAsUserA
shell32
SHGetSpecialFolderLocation
SHGetPathFromIDListA
SHGetMalloc
Sections
.text Size: 84KB - Virtual size: 83KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 16KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 920B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
UPX0 Size: 144KB - Virtual size: 380KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE