Behavioral task
behavioral1
Sample
8590e39d06ad1738c8a297d4bc05509c_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
8590e39d06ad1738c8a297d4bc05509c_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
8590e39d06ad1738c8a297d4bc05509c_JaffaCakes118
-
Size
34KB
-
MD5
8590e39d06ad1738c8a297d4bc05509c
-
SHA1
24733245d951487f421af79545914ca2a81882a0
-
SHA256
0fa290be6b5e41d478a86e08865be206ba26696240776d2b888fc6f5a8c5deb4
-
SHA512
a912d3534dbdb27e9c7864cb0d4f6df2e7793712504de2d09ae75d985342ac91c79fdf5b7b7648c2ec05d19fd4a1963342a16ac9e354329a1c07ed46fc23deb3
-
SSDEEP
384:Aq1xPfRUjzHLI90fybewdJRaJb2HSSym6ObPHjElcJSsK+1R:H9UjzrI90CIaySymVH6CKsR
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8590e39d06ad1738c8a297d4bc05509c_JaffaCakes118
Files
-
8590e39d06ad1738c8a297d4bc05509c_JaffaCakes118.exe windows:4 windows x86 arch:x86
842744e536d5453cc10b59bd547a54ed
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetWindowsDirectoryA
CreateThread
ResumeThread
SuspendThread
Sleep
WaitForSingleObject
CreateEventA
GetLastError
ExitProcess
CreateToolhelp32Snapshot
Process32First
Process32Next
CloseHandle
SetEvent
OpenProcess
GetModuleHandleA
GetCommandLineA
GetVersionExA
HeapFree
HeapAlloc
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
LCMapStringA
WideCharToMultiByte
MultiByteToWideChar
LCMapStringW
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
GetModuleFileNameA
GetProcAddress
TerminateProcess
GetCurrentProcess
WriteFile
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetStartupInfoA
HeapDestroy
HeapCreate
VirtualFree
HeapReAlloc
GetLocaleInfoA
GetCPInfo
RtlUnwind
InterlockedExchange
LoadLibraryA
GetStringTypeA
GetStringTypeW
GetACP
GetOEMCP
HeapSize
advapi32
RegisterServiceCtrlHandlerA
SetServiceStatus
OpenProcessToken
CreateProcessAsUserA
StartServiceCtrlDispatcherA
Sections
UPX0 Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.avc Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE