Behavioral task
behavioral1
Sample
335306d07e383ceac211b799ad012245_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
335306d07e383ceac211b799ad012245_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
335306d07e383ceac211b799ad012245_JaffaCakes118
-
Size
81KB
-
MD5
335306d07e383ceac211b799ad012245
-
SHA1
8aa31fb7b978c3f20e84f0966c3ea4428d6165c7
-
SHA256
ed1361d31721d070461e99e475889f8d225bd0cd5166d0b15b43a2e65fa3977e
-
SHA512
35b9f30ca53858701390fd70d23e12321daa1621ca69e59c32fd06bc05f13585ae6d3cd69ca7ec266b7ecd63a2ccfdaa1625b7e41ea812c2e4039b94b3ea4259
-
SSDEEP
1536:jB2x2r2Gyr1HZRLY6ppieHP77W9fu0KpPp6qinjprAMv1OUoauf//MTi926B6:jBUObuRs6ppiX9fepOMg1OEuf//5g
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 335306d07e383ceac211b799ad012245_JaffaCakes118
Files
-
335306d07e383ceac211b799ad012245_JaffaCakes118.exe windows:4 windows x86 arch:x86
f433e7fcc51e68080022754836705744
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleA
LoadLibraryA
GetProcAddress
ExitProcess
VirtualAlloc
VirtualFree
user32
MessageBoxA
Sections
UPX0 Size: - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
okwh1hir Size: - Virtual size: 72KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
hk1dqdx9 Size: 79KB - Virtual size: 80KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
bdutkwjj Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ