Behavioral task
behavioral1
Sample
3fc1e5e40790ffb792ae2fb26ce7827c_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3fc1e5e40790ffb792ae2fb26ce7827c_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3fc1e5e40790ffb792ae2fb26ce7827c_JaffaCakes118
-
Size
63KB
-
MD5
3fc1e5e40790ffb792ae2fb26ce7827c
-
SHA1
b6ba27bffb9ebcc5e5aa68f3f8dd56963458b3b6
-
SHA256
79f8420c91e9131a7cf3da831334937ba276b325a8f6eed7b5eb22b0c8283790
-
SHA512
e487c12895452e1f2a09ae72a1f16f54f3fd480999792996d070e64293612bc5869a5a4d268427f502a88ea9babd45a4b0242cc0fb222ef5cb731b22ed5bfd3e
-
SSDEEP
1536:qsnB6a/2aoplsKr2O9GU/xDobLzwrc5ydLY9SLXH7pDQoEZUR+k238ggcd9Z:qsnU5plJ79GUubLUr+ydLE0pQbUkk23B
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3fc1e5e40790ffb792ae2fb26ce7827c_JaffaCakes118
Files
-
3fc1e5e40790ffb792ae2fb26ce7827c_JaffaCakes118.exe windows:5 windows x86 arch:x86
902b8c2fd394813ee03fd9eb0836e4a9
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FreeEnvironmentStringsA
GetTickCount
GetWindowsDirectoryA
GlobalAlloc
GetVolumeInformationA
GlobalFindAtomA
CreateProcessA
ReadFile
IsDBCSLeadByteEx
GetProfileSectionA
GetComputerNameW
SetConsoleCtrlHandler
GlobalHandle
GetModuleFileNameA
CreateMutexA
CloseHandle
GetPrivateProfileSectionW
GetTempPathA
lstrcpyA
GetNumberOfConsoleMouseButtons
_lwrite
GetTempFileNameA
OpenFile
WaitForSingleObject
GetLongPathNameW
GetFileSize
VirtualProtect
user32
DdeInitializeW
GetMessageA
DdeCreateStringHandleW
CopyAcceleratorTableW
ToUnicodeEx
RegisterClassA
DefFrameProcW
SetFocus
wsprintfA
AnyPopup
gdi32
ScaleWindowExtEx
CreatePolyPolygonRgn
PlayEnhMetaFile
SetMapperFlags
ws2_32
htonl
WSAStartup
connect
recv
bind
socket
closesocket
gethostbyname
send
htons
shlwapi
StrStrIA
iphlpapi
GetAdaptersInfo
msvcrt
memset
memcpy
Sections
.text Size: - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.UPX0 Size: - Virtual size: 374B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.UPX1 Size: - Virtual size: 52KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
.UPX2 Size: 62KB - Virtual size: 61KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 100B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ