Behavioral task
behavioral1
Sample
2ac846403eb79d06e93abe7832b1ec18_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2ac846403eb79d06e93abe7832b1ec18_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
2ac846403eb79d06e93abe7832b1ec18_JaffaCakes118
-
Size
57KB
-
MD5
2ac846403eb79d06e93abe7832b1ec18
-
SHA1
be71ba9963d0d2ba7efcbc5198b885bb00dd8324
-
SHA256
5cef735e175449149be77f1b38d3000369667bac90cb93fa66378a9f94dbd573
-
SHA512
979bba7aeed636522ef499e1693104264ea0d3a70c15cb90260685581ea8125a71002598365c68ca003db6bdc04fa7f8035ae1d34acc44078a79fd4178674837
-
SSDEEP
1536:pmlD2PiNkb3juraEU/8dnhx3SlMUyNHw+lRmJ:glKPk43gaf/8dnhUl2N78
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2ac846403eb79d06e93abe7832b1ec18_JaffaCakes118
Files
-
2ac846403eb79d06e93abe7832b1ec18_JaffaCakes118.exe windows:5 windows x86 arch:x86
dad35385634f3528ab27d4bdfd3ac1fe
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetTickCount
CreateNamedPipeW
GetWindowsDirectoryA
GlobalAlloc
GetVolumeInformationA
GetSystemWindowsDirectoryA
CreateProcessA
_lwrite
CreateDirectoryExA
GetTempFileNameA
GetModuleFileNameA
FatalExit
CreateMailslotA
CloseHandle
GetTempPathA
SetErrorMode
lstrlenA
SetThreadLocale
WaitForSingleObject
ReadFile
OpenFile
VirtualProtect
user32
EnumPropsW
ChangeMenuA
wsprintfA
GetMessageW
GetMenuItemInfoA
OemToCharBuffA
RegisterClassW
GetClipboardViewer
FrameRect
UnregisterClassA
CreateMDIWindowA
SendNotifyMessageA
gdi32
ResetDCW
FloodFill
CreatePatternBrush
ws2_32
htonl
WSAStartup
connect
htons
bind
socket
closesocket
gethostbyname
send
recv
shlwapi
StrStrIA
iphlpapi
GetAdaptersInfo
msvcrt
memset
memcpy
Sections
.text Size: - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.UPX0 Size: - Virtual size: 356B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.UPX1 Size: - Virtual size: 40KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
.UPX2 Size: 56KB - Virtual size: 55KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 124B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ