Behavioral task
behavioral1
Sample
8ae492f4d9b4b4afa56ac6f76adbb253_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
8ae492f4d9b4b4afa56ac6f76adbb253_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
8ae492f4d9b4b4afa56ac6f76adbb253_JaffaCakes118
-
Size
93KB
-
MD5
8ae492f4d9b4b4afa56ac6f76adbb253
-
SHA1
01178fb6cfd13d49e1fdcc9abf9eba20566a8586
-
SHA256
0a043fba84c8bf94b2b8f86455670492fb569a05614a009e166cfdded9cbae11
-
SHA512
673e79218710b8bc762d921877cf7685cba68a24d7f9347629ced2ce2482bb21c28ad7549e6371d7252cc16e90c5eff1b0780ff73baac386b13862a548fb8881
-
SSDEEP
1536:CkUxmWwj4l4GMoxo8VTi1WQHUoauf6e0Lsn2kn0V:YmqtBo8kjHmtLshns
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8ae492f4d9b4b4afa56ac6f76adbb253_JaffaCakes118
Files
-
8ae492f4d9b4b4afa56ac6f76adbb253_JaffaCakes118.exe windows:4 windows x86 arch:x86
0df97f816fe8c647ab4a40ce9847e80a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetEnvironmentVariableA
CompareStringW
CompareStringA
SetEndOfFile
GetOEMCP
GetACP
GetStringTypeW
GetStringTypeA
FreeLibrary
GetCurrentProcessId
GetProcAddress
LoadLibraryA
GetSystemDirectoryA
Sleep
WinExec
CopyFileA
GetModuleFileNameA
GetWindowsDirectoryA
GetLocalTime
GlobalUnlock
GlobalLock
FindClose
FindNextFileA
FindFirstFileA
TerminateProcess
OpenProcess
SetLastError
GetLastError
DeleteFileA
HeapAlloc
GetFileAttributesA
GetTimeZoneInformation
GetSystemTime
InterlockedDecrement
InterlockedIncrement
ExitProcess
GetCurrentProcess
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
EnterCriticalSection
LeaveCriticalSection
HeapFree
CloseHandle
ReadFile
HeapDestroy
HeapCreate
VirtualFree
InitializeCriticalSection
DeleteCriticalSection
VirtualAlloc
HeapReAlloc
SetHandleCount
GetStdHandle
GetFileType
SetFilePointer
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsGetValue
WideCharToMultiByte
MultiByteToWideChar
LCMapStringA
LCMapStringW
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
RtlUnwind
WriteFile
SetStdHandle
FlushFileBuffers
CreateFileA
GetCPInfo
advapi32
RegDeleteValueA
RegSetValueExA
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
gdi32
GetPixel
psapi
EnumProcesses
EnumProcessModules
GetModuleBaseNameA
urlmon
URLDownloadToFileA
user32
PeekMessageA
GetDesktopWindow
GetWindowThreadProcessId
GetDC
ReleaseDC
GetWindowTextLengthA
GetWindowTextA
GetKeyNameTextA
UnhookWindowsHookEx
SetWindowsHookExA
PostMessageA
FindWindowA
DefWindowProcA
SetTimer
EnumChildWindows
GetForegroundWindow
KillTimer
DispatchMessageA
TranslateMessage
GetMessageA
CreateWindowExA
RegisterClassA
LoadIconA
SetFocus
GetClassNameA
SendMessageA
GetWindowRect
CallNextHookEx
GetCursorPos
CloseClipboard
GetClipboardData
OpenClipboard
keybd_event
ToAscii
GetKeyboardState
wsock32
setsockopt
htons
inet_addr
socket
send
recv
gethostbyname
gethostname
connect
select
__WSAFDIsSet
WSAGetLastError
closesocket
WSAStartup
WSACleanup
Sections
UPX0 Size: 88KB - Virtual size: 88KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.avp Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE