Behavioral task
behavioral1
Sample
470fa57e445fa9e9c9bd40b596fb3e41_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
470fa57e445fa9e9c9bd40b596fb3e41_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
470fa57e445fa9e9c9bd40b596fb3e41_JaffaCakes118
-
Size
77KB
-
MD5
470fa57e445fa9e9c9bd40b596fb3e41
-
SHA1
e64b679abf0c6bc6613a3c0537b9d74afd1320a9
-
SHA256
9803eb848eab2947320929dd74debb64305c6f463235975318b75f8ced2049f3
-
SHA512
73dc20d47afefad7b490aa005668301d6599a4e93c48c9146557b4ff1baed25c0ae3aa77cd853d13ebed926bc5d6ad12037e85120731916cc993cdb7b2c72200
-
SSDEEP
768:UQj+qWQUzJ6wxUZ5SEQGYTPMPM9PXg/Eg9KQwuj0R708fDDsW194Vy1HIURLtKNq:V+qWQaJwRQ3xR7VfSy1HnDKwLD
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 470fa57e445fa9e9c9bd40b596fb3e41_JaffaCakes118
Files
-
470fa57e445fa9e9c9bd40b596fb3e41_JaffaCakes118.exe windows:4 windows x86 arch:x86
c3031c6846fced7d26e026d5c5191feb
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Imports
kernel32
Sleep
TlsSetValue
TlsGetValue
LocalAlloc
GetModuleHandleA
WriteProcessMemory
WriteFile
WinExec
VirtualQuery
VirtualFreeEx
VirtualAllocEx
TerminateProcess
SetFileAttributesA
OpenProcess
GetWindowsDirectoryA
GetVersionExA
GetThreadLocale
GetStringTypeExA
GetStdHandle
GetProcAddress
GetModuleHandleA
GetModuleFileNameA
GetLocaleInfoA
GetLastError
GetFullPathNameA
GetDriveTypeA
GetDiskFreeSpaceA
GetCPInfo
GetACP
FindNextFileA
FindFirstFileA
FindClose
FileTimeToLocalFileTime
FileTimeToDosDateTime
EnumCalendarInfoA
DeleteFileA
CreateRemoteThread
CreateProcessA
CreateMutexA
CopyFileA
CloseHandle
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
VirtualFree
VirtualAlloc
LocalFree
LocalAlloc
GetVersion
GetCurrentThreadId
WideCharToMultiByte
lstrlenA
lstrcpynA
LoadLibraryExA
GetThreadLocale
GetStartupInfoA
GetProcAddress
GetModuleHandleA
GetModuleFileNameA
GetLocaleInfoA
GetLastError
GetCommandLineA
FreeLibrary
FindFirstFileA
FindClose
ExitProcess
WriteFile
UnhandledExceptionFilter
SetFilePointer
SetEndOfFile
RtlUnwind
ReadFile
RaiseException
GetStdHandle
GetFileSize
GetFileType
CreateFileA
CloseHandle
advapi32
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
RegSetValueExA
RegQueryValueExA
RegOpenKeyExA
RegCreateKeyA
RegCloseKey
oleaut32
SysFreeString
shell32
ShellExecuteA
urlmon
URLDownloadToFileA
user32
TranslateMessage
SetTimer
MessageBoxA
LoadStringA
GetWindowThreadProcessId
GetSystemMetrics
GetMessageA
FindWindowA
DispatchMessageA
CharNextA
CharToOemA
GetKeyboardType
LoadStringA
MessageBoxA
CharNextA
Sections
UPX0 Size: 72KB - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.avc Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE