Behavioral task
behavioral1
Sample
3571a7334138caa40c7c9e4794dee2ee_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3571a7334138caa40c7c9e4794dee2ee_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3571a7334138caa40c7c9e4794dee2ee_JaffaCakes118
-
Size
86KB
-
MD5
3571a7334138caa40c7c9e4794dee2ee
-
SHA1
01b87d40f919e4b7865df93a0eecea61f5c340dd
-
SHA256
ab3fe03da1fd270285f38ed07e3c32bc197ffab383d286383236973f7bc613da
-
SHA512
0d4ed8bd37776dabb47e5e14b4cd17414fca478674f643fd524d39f1aa585f529aa98325c7e90cddea6afc32e4c47a80b51060d15a690bb135d35f1076439f06
-
SSDEEP
1536:uhBR5JRjssVh0vYvQqVmWQXwl9YhIgF1kBloXAR:uhTKsMKjQbV1kR
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3571a7334138caa40c7c9e4794dee2ee_JaffaCakes118
Files
-
3571a7334138caa40c7c9e4794dee2ee_JaffaCakes118.exe windows:4 windows x86 arch:x86
8d2cca52063d54f344e44017098c90f6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapDestroy
LCMapStringW
LCMapStringA
CloseHandle
SetStdHandle
LoadLibraryA
GetProcAddress
ExitProcess
TerminateProcess
GetCurrentProcess
GetCommandLineA
GetVersion
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
HeapAlloc
UnhandledExceptionFilter
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
HeapCreate
VirtualFree
HeapFree
RtlUnwind
WriteFile
GetLastError
SetFilePointer
VirtualAlloc
HeapReAlloc
FlushFileBuffers
MultiByteToWideChar
GetStringTypeA
GetStringTypeW
GetCPInfo
GetACP
GetOEMCP
libmysql
mysql_init
mysql_real_connect
mysql_select_db
mysql_free_result
mysql_close
mysql_query
Sections
UPX0 Size: 84KB - Virtual size: 84KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.avp Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE