Behavioral task
behavioral1
Sample
5cf33c0ee436f0b051708321175f192f_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
5cf33c0ee436f0b051708321175f192f_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
5cf33c0ee436f0b051708321175f192f_JaffaCakes118
-
Size
128KB
-
MD5
5cf33c0ee436f0b051708321175f192f
-
SHA1
89f2791ef3fd2eb9192d325b3a98807610326a78
-
SHA256
0f7d81327781c2bfd823f7c2efb93f197ad8571aff478fe875f8b2f0efd0076e
-
SHA512
ea0a38044ce0efa2777486acdbba937e76c5f60f13c22a7d8f4d080d3679f22edd9930d15f89500021efb8f3969e36ce06cb13d06093bb47754c2cdfaf3663e9
-
SSDEEP
3072:65bsKrJkfSDJK9FEL6ZomOmDQpOW/UkL81juZQTZeDYA7yqFA:65l6fSDaFOnhskwuuTZ2YAVFA
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5cf33c0ee436f0b051708321175f192f_JaffaCakes118
Files
-
5cf33c0ee436f0b051708321175f192f_JaffaCakes118.exe windows:4 windows x86 arch:x86
b62cb871051b2c8828ac82a1067186b2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mfc42
ord2512
ord5731
ord3922
ord1089
ord2554
ord5199
ord2396
ord3346
ord5300
ord5302
ord2725
ord4079
ord4698
ord5307
ord5289
ord5714
ord2982
ord3147
ord3259
ord4465
ord3136
ord3262
ord2985
ord6375
ord4486
ord3830
ord3831
ord3825
ord3079
ord4080
ord4622
ord4424
ord3738
ord561
ord825
ord815
ord800
ord690
ord1988
ord2393
ord5807
ord6059
ord4274
ord3229
ord389
ord537
ord2621
ord2976
ord3081
ord5204
ord1168
ord1576
msvcrt
__setusermatherr
_adjust_fdiv
__p__commode
_initterm
_acmdln
__getmainargs
__p___argv
_controlfp
fseek
fputs
fclose
exit
_XcptFilter
_exit
??1type_info@@UAE@XZ
_onexit
__dllonexit
__CxxFrameHandler
__p___argc
__p__fmode
__set_app_type
_setmbcp
fopen
_except_handler3
kernel32
GetModuleHandleA
GetStartupInfoA
msvcp60
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??1_Winit@std@@QAE@XZ
??0_Winit@std@@QAE@XZ
??1Init@ios_base@std@@QAE@XZ
??0Init@ios_base@std@@QAE@XZ
Sections
.text Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 472B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.UPX0 Size: 104KB - Virtual size: 252KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE