Behavioral task
behavioral1
Sample
46877e0b1aa4ccce7d9c1584828c4b7e_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
46877e0b1aa4ccce7d9c1584828c4b7e_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
46877e0b1aa4ccce7d9c1584828c4b7e_JaffaCakes118
-
Size
40KB
-
MD5
46877e0b1aa4ccce7d9c1584828c4b7e
-
SHA1
7c94328b9b48eccf408498c76e251349c82c55f8
-
SHA256
3ff8bdbafce5a4a516bd9000810aa6068751a079e25719acadd12db9a8c22bf2
-
SHA512
803313bb25277ba4db17bab7cfcb0f6b84ecc1d9d3c6a48287dfa4e4506ddcf008cb531875f8c732297f1c1126f6c2773d12547c12d6250cf4eef975d619aeff
-
SSDEEP
768:2MFLHFRR8dkLEHpKcGUkG692/lEVcd9cdU5f:2MhmdkLTcG592/CcvcdA
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 46877e0b1aa4ccce7d9c1584828c4b7e_JaffaCakes118
Files
-
46877e0b1aa4ccce7d9c1584828c4b7e_JaffaCakes118.exe windows:4 windows x86 arch:x86
27eac643b5cdc8a66d5c497b14ba29e1
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleFileNameW
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
IsDebuggerPresent
SetUnhandledExceptionFilter
GetCurrentProcess
QueryPerformanceCounter
InitializeCriticalSection
SetErrorMode
GetLastError
RemoveDirectoryW
GetVolumeInformationW
LoadLibraryW
FreeLibrary
Sleep
CreateDirectoryW
CreateMutexA
VirtualAllocEx
version
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
advapi32
RegOpenKeyExW
RegSetValueExW
RegDeleteKeyW
RegDeleteValueW
RegCloseKey
RegQueryValueExW
RegCreateKeyExW
loadperf
UpdatePerfNameFilesW
UnloadPerfCounterTextStringsA
user32
SetWindowTextW
LoadImageA
LoadMenuW
DialogBoxIndirectParamA
CopyRect
PostQuitMessage
GetMenuItemInfoW
ActivateKeyboardLayout
LoadImageW
ShowCursor
LoadMenuIndirectA
MonitorFromRect
EnumClipboardFormats
SetCursorPos
InvalidateRect
RegisterClassA
WaitMessage
PeekMessageW
GetScrollPos
OffsetRect
DialogBoxIndirectParamW
GetDlgItemTextW
EnableWindow
colbact
DllRegisterServer
Sections
UPX0 Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.text Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.C Size: 1024B - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.pMTqU Size: 4KB - Virtual size: 62KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.Dnhw Size: 2KB - Virtual size: 296KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.edata Size: 10KB - Virtual size: 59KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.KjNq Size: 2KB - Virtual size: 318KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 6KB - Virtual size: 290KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 10KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ