Behavioral task
behavioral1
Sample
833e8aab5897c51611e3d8bcb55ac575_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
833e8aab5897c51611e3d8bcb55ac575_JaffaCakes118
-
Size
18KB
-
MD5
833e8aab5897c51611e3d8bcb55ac575
-
SHA1
3e69353a4e3a65cbdeef6209da40e79c53b6a2e0
-
SHA256
5020db29f5a399088235851c7ad1729608ebba65144b607349cd3ca11718614a
-
SHA512
29d180c45645734af49a8be8d2d154d0f25bec56ffd4101faaeff66b9e9e29c641282ef2de60587e9b707ba5fecbb122c023c9ecb93876866a83af05e1828c1d
-
SSDEEP
192:NJzpkIa01jYAaMM9cNq2LyiL+ThNf4lUI41ic6bQRNffKiJD:NJaIa01jYAaMGc02ZLuVI41icvRp3JD
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 833e8aab5897c51611e3d8bcb55ac575_JaffaCakes118
Files
-
833e8aab5897c51611e3d8bcb55ac575_JaffaCakes118.exe windows:4 windows x86 arch:x86
bfb89e3d31cf0c613ecfd59f12c47234
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
wsock32
advapi32
RegCreateKeyExA
RegQueryValueExA
RegCloseKey
RegSetValueExA
user32
SetTimer
GetMessageA
CharUpperBuffA
msvcrt
strlen
memcpy
strcat
strstr
fopen
strrchr
??3@YAXPAX@Z
fread
??2@YAPAXI@Z
ftell
fseek
strncpy
fwrite
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
_controlfp
fclose
memset
sscanf
strncmp
strcmp
sprintf
_XcptFilter
strcpy
_exit
kernel32
GetModuleHandleA
GetProcAddress
GetCurrentProcessId
InitializeCriticalSection
GetWindowsDirectoryA
GetStartupInfoA
GetLocalTime
LoadLibraryA
GetModuleFileNameA
OpenProcess
TerminateProcess
FreeLibrary
CopyFileA
GetCommandLineA
CloseHandle
CreateThread
GetSystemDirectoryA
DeleteFileA
EnterCriticalSection
CreateProcessA
LeaveCriticalSection
ExitProcess
Sections
UPX0 Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.avp Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE