Behavioral task
behavioral1
Sample
473ea002f1d8546fb93941da439bacd2_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
473ea002f1d8546fb93941da439bacd2_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
473ea002f1d8546fb93941da439bacd2_JaffaCakes118
-
Size
66KB
-
MD5
473ea002f1d8546fb93941da439bacd2
-
SHA1
b51c744913ead57fcb13ee24e769099a828fe1e4
-
SHA256
5dc4220ec753ea599086ba2846806a49d8e69cbcf42cb24e788d1f468189b814
-
SHA512
28cc5101dc549bf942f66521bf77ea72df4ad659da3624758fd21daa3fa6fb37a2ef8a3149ef2fac1511e08490ea45df0c2a2d568832c420b765abc20dd189fc
-
SSDEEP
1536:5uuUHuum2PY2Sb8SOXRCKh7h8oyaw6c/d+Zs+ll:5T0uSP08SORCIyuaP+
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 473ea002f1d8546fb93941da439bacd2_JaffaCakes118
Files
-
473ea002f1d8546fb93941da439bacd2_JaffaCakes118.exe windows:5 windows x86 arch:x86
8090fcbf0e51e00a77d521567de7e35a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetConsoleMode
SetMessageWaitingIndicator
CreateProcessA
ReadFile
EnumSystemLocalesA
GetLogicalDriveStringsA
GlobalAlloc
GetTimeFormatW
EnumResourceTypesW
GetModuleFileNameA
TlsAlloc
CloseHandle
GetTempPathA
GetWindowsDirectoryA
GetTickCount
GetTempFileNameA
GetVolumeInformationA
WaitForSingleObject
GetNumberOfConsoleMouseButtons
_lwrite
FreeResource
IsValidCodePage
OpenFile
VirtualProtect
user32
OemToCharW
GetClassNameA
GetDC
EndPaint
CheckMenuItem
CharToOemBuffW
BeginDeferWindowPos
DdeConnect
DdeImpersonateClient
wsprintfA
gdi32
GetTextMetricsA
SetMiterLimit
StartDocA
CreateMetaFileA
GetCharABCWidthsFloatA
GetBrushOrgEx
GetTextCharsetInfo
ws2_32
htonl
WSAStartup
connect
recv
bind
socket
closesocket
gethostbyname
send
htons
shlwapi
StrStrIA
iphlpapi
GetAdaptersInfo
msvcrt
memset
memcpy
Sections
.text Size: - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.UPX0 Size: - Virtual size: 372B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.UPX1 Size: - Virtual size: 59KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
.UPX2 Size: 65KB - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 52B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ