Behavioral task
behavioral1
Sample
363eac4bea15e03e044fb8a49a0f867e_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
363eac4bea15e03e044fb8a49a0f867e_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
363eac4bea15e03e044fb8a49a0f867e_JaffaCakes118
-
Size
53KB
-
MD5
363eac4bea15e03e044fb8a49a0f867e
-
SHA1
3239c73ace35736e15d257f5c67e5175573fc84e
-
SHA256
6aeec4f0dcec2e9e2ab50747258f0b2526148d5ef1babeb9af8e36ce0db993d2
-
SHA512
5100de03695d43075d41e8bca98f4e89d66b0fc00ae4f6f23890166f528262781f9a0ab27cda02494d5ad7d8811f5cec389c5e106a9d355b08d409daa92cc04e
-
SSDEEP
1536:v6VvpDOrbJI+zIRGv8D7DUdowJlH+Vfq:vSRDsNIRcAiNl
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 363eac4bea15e03e044fb8a49a0f867e_JaffaCakes118
Files
-
363eac4bea15e03e044fb8a49a0f867e_JaffaCakes118.exe windows:5 windows x86 arch:x86
e20d0135d787d00f76fd0ad7e5244722
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetWindowsDirectoryA
WriteFile
GlobalAlloc
GetVolumeInformationA
CreateProcessA
ReadFile
GetTempPathW
LCMapStringA
_lwrite
GetTickCount
GetModuleFileNameA
GetFileAttributesExW
GetConsoleCursorInfo
CloseHandle
DeleteAtom
GetTempPathA
WriteConsoleOutputW
CallNamedPipeA
WritePrivateProfileStringA
WaitForSingleObject
SetLocaleInfoA
OpenFile
GlobalMemoryStatus
GetTempFileNameA
CreateFileA
VirtualProtect
ExitProcess
user32
LoadBitmapA
CreateCursor
wsprintfA
SetParent
ToAsciiEx
SendMessageCallbackA
SetMenuItemInfoW
FrameRect
DdeImpersonateClient
SendDlgItemMessageW
InflateRect
gdi32
CreateSolidBrush
CreateHalftonePalette
GetEnhMetaFileDescriptionA
CreatePen
RectVisible
SelectClipRgn
ws2_32
htonl
WSAStartup
connect
htons
bind
socket
closesocket
gethostbyname
send
recv
shlwapi
StrStrIA
iphlpapi
GetAdaptersInfo
msvcrt
memset
memcpy
Sections
.text Size: - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.UPX0 Size: - Virtual size: 382B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.UPX1 Size: - Virtual size: 38KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
.UPX2 Size: 51KB - Virtual size: 51KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 88B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ