Behavioral task
behavioral1
Sample
8d9f091b84ae3101d28cb830390f4c9b_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
8d9f091b84ae3101d28cb830390f4c9b_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
8d9f091b84ae3101d28cb830390f4c9b_JaffaCakes118
-
Size
91KB
-
MD5
8d9f091b84ae3101d28cb830390f4c9b
-
SHA1
1c9c059c19af490146cdf855d68fd145c5949344
-
SHA256
c5b44dbc56b5bc2dc6db81ebf1b6dc7eb9f2080b96a99e9eda46d76ab73dad80
-
SHA512
e8c784ca79a169b9af0f5d198be42634316112a415f289a6756bed00a1939f76056450808c38ee91e5b47e2234553d46b916af823641673c944877ef6003afdc
-
SSDEEP
1536:ENz/kA435RWnnRYrZY39YCMmQ61mLILbvMJvx4NBTSCFUyIVYUnMgTPGWDgE7:ENAA435RWnnRYrZw9YCMmQ6ILILbvMhr
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8d9f091b84ae3101d28cb830390f4c9b_JaffaCakes118
Files
-
8d9f091b84ae3101d28cb830390f4c9b_JaffaCakes118.exe windows:1 windows x86 arch:x86
ffd94988d643c6dcd499702acef5cc15
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ExitProcess
FindClose
FindFirstFileA
FindNextFileA
FreeLibrary
GetCommandLineA
GetCurrentProcess
GetDateFormatA
GetExitCodeProcess
GetFileAttributesA
GetFileSize
GetLastError
GetModuleFileNameA
GetModuleHandleA
CloseHandle
GetProcAddress
GetSystemDirectoryA
GetTickCount
GetTimeFormatA
GetVersionExA
GetWindowsDirectoryA
GlobalMemoryStatus
CopyFileA
LoadLibraryA
CreateDirectoryA
MoveFileA
OpenProcess
PeekNamedPipe
CreateFileA
ReadFile
RtlUnwind
SetFileAttributesA
SetFilePointer
CreateMutexA
Sleep
TerminateProcess
TerminateThread
CreatePipe
CreateProcessA
WriteFile
lstrcpyA
lstrcpynA
lstrlenA
CreateThread
DeleteFileA
DuplicateHandle
advapi32
GetUserNameA
RegDeleteValueA
RegCreateKeyA
RegCreateKeyExA
RegCloseKey
RegOpenKeyA
RegQueryValueExA
RegSetValueExA
crtdll
__GetMainArgs
atoi
exit
fclose
fopen
fputs
fread
fwrite
malloc
memcpy
memset
raise
rand
signal
sprintf
srand
strcat
strchr
strcmp
strncpy
strstr
strtok
shell32
ShellExecuteA
user32
GetWindowTextA
GetForegroundWindow
GetKeyState
GetAsyncKeyState
MapVirtualKeyA
ExitWindowsEx
CharUpperBuffA
CharToOemA
keybd_event
winmm
mciSendStringA
ws2_32
htons
ioctlsocket
inet_addr
inet_ntoa
listen
ntohs
recv
select
accept
send
socket
gethostbyaddr
gethostbyname
bind
closesocket
WSAGetLastError
WSAStartup
WSACleanup
__WSAFDIsSet
connect
getpeername
getsockname
htonl
Sections
UPX0 Size: 88KB - Virtual size: 88KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.avp Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE