Behavioral task
behavioral1
Sample
678da34c1342b3df5810c8a105535163_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
678da34c1342b3df5810c8a105535163_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
678da34c1342b3df5810c8a105535163_JaffaCakes118
-
Size
41KB
-
MD5
678da34c1342b3df5810c8a105535163
-
SHA1
7f72850e9182176b0fecfd376fd94546f2194e6f
-
SHA256
a9ea318baa2a0c9b0965eae3ac356353d61dd60015d99232ba07454e6752dccd
-
SHA512
7b9b41a24df8af25bc17ef73b58322c8be22b5ed19cb4ec73c7502bad53e8f1870ef719fb0d1d7ec38ac7253ee156e54e2daa2baefc1ad25f14a359d6e3739f1
-
SSDEEP
768:V/WvWuZOTq/gRzpTxBUsAE1ZTDrGCWGEx0DA2pO1:kOgszpTxBfzTnGJGExic1
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 678da34c1342b3df5810c8a105535163_JaffaCakes118
Files
-
678da34c1342b3df5810c8a105535163_JaffaCakes118.exe windows:4 windows x86 arch:x86
388cf6399e2748384a403551eea8b1f6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindResourceA
GetSystemDirectoryA
CloseHandle
ReadFile
GetFileSize
CreateFileA
GetLocaleInfoA
FreeLibrary
GetProcAddress
GetCommandLineA
LoadLibraryA
DeleteFileA
GlobalUnlock
GlobalLock
ResumeThread
SetThreadContext
GetThreadContext
WriteProcessMemory
VirtualAllocEx
GetModuleHandleA
CreateProcessA
GetStartupInfoA
Sleep
CopyFileA
GetUserDefaultLangID
GetWindowsDirectoryA
GetModuleFileNameA
SizeofResource
LoadResource
advapi32
RegQueryValueExA
RegSetValueExA
RegCloseKey
RegCreateKeyExA
RegOpenKeyExA
mfc42
msvcrt
_controlfp
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
_onexit
__dllonexit
fopen
localtime
asctime
fputs
fclose
rand
time
_setmbcp
_strlwr
_mbscmp
__CxxFrameHandler
free
realloc
malloc
tolower
srand
shell32
ShellExecuteA
user32
PostMessageA
CloseClipboard
GetClipboardData
OpenClipboard
IsClipboardFormatAvailable
GetWindowTextA
DefWindowProcA
RegisterClassA
SetClipboardViewer
SetTimer
GetMessageA
DispatchMessageA
IsWindow
PostQuitMessage
LoadCursorA
MessageBoxA
DestroyWindow
CreateWindowExA
wininet
InternetConnectA
InternetOpenA
InternetReadFile
InternetCloseHandle
HttpOpenRequestA
HttpSendRequestA
Sections
UPX0 Size: 36KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.avc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE