Behavioral task
behavioral1
Sample
2b0b29312a4b2682f85d7275305b2d85_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2b0b29312a4b2682f85d7275305b2d85_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
2b0b29312a4b2682f85d7275305b2d85_JaffaCakes118
-
Size
257KB
-
MD5
2b0b29312a4b2682f85d7275305b2d85
-
SHA1
137e76b773b605ce9249f0d57ac6d3573597613a
-
SHA256
a04d68af5ffbcf25b5544da43a22a5c2535c5a0835c62662f8e5720cd0412f7c
-
SHA512
e82d4a9ea390199bdd03a615abb9f2c9d44e909c166893f77642cb362d8bfcad4949bd965ec964382f3c2cdf6de9dd0bd62a606c5e0fe0e07432f68da7dcf2e6
-
SSDEEP
6144:2+g/UuZuwAjDwzzCAoyzOC6IvDePVf6MCRON/7:2CRDqCXyqief68N/7
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2b0b29312a4b2682f85d7275305b2d85_JaffaCakes118
Files
-
2b0b29312a4b2682f85d7275305b2d85_JaffaCakes118.exe windows:4 windows x86 arch:x86
200c5e0c0d11a997573a76f477e3b859
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLastError
LoadLibraryW
FreeLibrary
FileTimeToSystemTime
FileTimeToLocalFileTime
GetFileAttributesW
MoveFileW
GetCurrentThreadId
GetVersionExA
GetProcessHeap
GetCurrentProcess
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapCreate
GetModuleHandleA
ExitProcess
GetModuleFileNameA
GetCurrentDirectoryA
TlsAlloc
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
Sleep
GetStartupInfoA
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
MultiByteToWideChar
InitializeCriticalSection
LoadLibraryA
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
GetVersion
GetProcAddress
scecli
SceStartTransaction
SceSetupUpdateSecurityFile
SceConfigureSystem
SceSvcConvertSDToText
SceGenerateRollback
SceSysPrep
SceAnalyzeSystem
SceSvcGetInformationTemplate
SceCopyBaseProfile
SceGetObjectChildren
SceFreeMemory
mssip32
CryptSIPGetSignedDataMsg
Sections
UPX0 Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.o Size: 2KB - Virtual size: 171KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.TpJ Size: 512B - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.edata Size: 78KB - Virtual size: 94KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.Ngg Size: 3KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 7KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 138KB - Virtual size: 165KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ