Behavioral task
behavioral1
Sample
63a498b243d2dfcfb236dcd951fc4a90_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
63a498b243d2dfcfb236dcd951fc4a90_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
63a498b243d2dfcfb236dcd951fc4a90_JaffaCakes118
-
Size
720KB
-
MD5
63a498b243d2dfcfb236dcd951fc4a90
-
SHA1
3399a786f27afd74cff158464f4f835ef1374533
-
SHA256
c3e3283c217cc1b3f28e3d68fd7e8abc0f51f788ba1e85690e1edbfd17baea31
-
SHA512
578a098c1a8ad7f488d854289c80a172caae1aa63d6f89774d467a3cb02f6f75b70984a9e9cdcb76eb08e400c0913362c33608748efe905949921286c78d1867
-
SSDEEP
12288:3bk2y3fRx3m73Cbfccr2J6iKwnU1aurh9cpCpC8bCWI+cCs/Q4bBcQSvSMiyYE:LkhfR5y3Sccr2J6gn039cpC7xITKvFYE
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 63a498b243d2dfcfb236dcd951fc4a90_JaffaCakes118
Files
-
63a498b243d2dfcfb236dcd951fc4a90_JaffaCakes118.exe windows:4 windows x86 arch:x86
9c8decf3582072f6edfc385a689f44f4
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
CreateDirectoryA
CreateFileA
DeleteFileA
ExitProcess
FreeLibrary
GetCommandLineA
GetFileTime
GetModuleHandleA
GetProcAddress
GetSystemDirectoryA
GetTempPathA
GetWindowsDirectoryA
LoadLibraryA
lstrcatA
lstrcmpiA
RemoveDirectoryA
SetFileTime
VirtualAlloc
VirtualFree
WriteFile
Sections
UPX0 Size: - Virtual size: 48KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 15KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
pebundle Size: 690KB - Virtual size: 692KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
pebundle Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE