Behavioral task
behavioral1
Sample
2ce99da2c9233638b33a3a7adfae4252_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2ce99da2c9233638b33a3a7adfae4252_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
2ce99da2c9233638b33a3a7adfae4252_JaffaCakes118
-
Size
101KB
-
MD5
2ce99da2c9233638b33a3a7adfae4252
-
SHA1
f6557877d45f8b2ab8dbb7d9688b2f74fb719ea7
-
SHA256
bf3bdd80893858b8a965e3c955533ce76359091147ead0efc10107b76cae55c0
-
SHA512
31b749b540495ae0d766955f23102e1ad071fe584bed0ee91fd830069ff69684c3c6383520ec9616b711eff47fa2e1cf66f90bfeee77418785cae167c1d8c61c
-
SSDEEP
1536:WiM1lZHcx5OWzUCEznRewgydIFooO22ifMskkzaAO:5AlV25OWfrydjoO22mMskCh
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2ce99da2c9233638b33a3a7adfae4252_JaffaCakes118
Files
-
2ce99da2c9233638b33a3a7adfae4252_JaffaCakes118.exe windows:4 windows x86 arch:x86
44ddbbe6230ea75d4641465cfa7a5242
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetFileAttributesA
ReadFile
HeapAlloc
UnmapViewOfFile
FlushViewOfFile
SetFilePointer
LocalFree
LocalUnlock
WriteProcessMemory
GetProcAddress
LoadLibraryA
ReadProcessMemory
GetCurrentProcess
LocalLock
LocalAlloc
HeapFree
CreateDirectoryA
DeleteFileA
GetFileAttributesA
FindNextFileA
Sleep
FindFirstFileA
GetLogicalDrives
SetEndOfFile
CreateFileA
GetLastError
Process32Next
Process32First
CreateToolhelp32Snapshot
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
ExitProcess
TerminateProcess
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
HeapDestroy
HeapCreate
VirtualFree
RtlUnwind
VirtualAlloc
HeapReAlloc
IsBadWritePtr
GetCPInfo
GetACP
GetOEMCP
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetFileSize
CreateFileMappingA
MapViewOfFile
WriteFile
CloseHandle
GetVersionExA
GetProcessHeap
GetSystemDirectoryA
GetWindowsDirectoryA
CreateThread
GetModuleFileNameA
CreateFileW
GetWindowsDirectoryW
GlobalLock
GlobalAlloc
Process32NextW
OpenProcess
GetExitCodeProcess
Process32FirstW
GetDriveTypeA
FindNextFileW
FindFirstFileW
DeleteFileW
SetFileAttributesW
advapi32
RegisterServiceCtrlHandlerA
ChangeServiceConfigA
StartServiceA
CreateServiceA
OpenServiceA
QueryServiceStatus
SetServiceStatus
RegCreateKeyExA
RegSetValueExA
RegCloseKey
QueryServiceConfigA
AdjustTokenPrivileges
LookupPrivilegeValueA
CloseServiceHandle
OpenSCManagerA
StartServiceCtrlDispatcherA
RegDeleteValueA
OpenProcessToken
shell32
ShellExecuteA
ws2_32
WSAStartup
closesocket
send
sendto
ntohl
htons
htonl
inet_addr
socket
accept
connect
recvfrom
__WSAFDIsSet
select
recv
listen
bind
user32
ExitWindowsEx
Sections
UPX0 Size: - Virtual size: 40KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 11KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 94KB - Virtual size: 94KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE