Behavioral task
behavioral1
Sample
a2fc63b4d9fd3668b3ad28addd07e1d4_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
a2fc63b4d9fd3668b3ad28addd07e1d4_JaffaCakes118
-
Size
37KB
-
MD5
a2fc63b4d9fd3668b3ad28addd07e1d4
-
SHA1
ad8db5c6b3f464f493b78bfb69f2c53bab950bf5
-
SHA256
c50746691bbbc7a9038164ba78bb2ec6fd5b1b7e89c0059dc7b57ecfe4a97931
-
SHA512
6e129909d5c4937d36073974db9329a24f9b86c2c30d1a97deaad9fabbda97148e08c72385efe2cb1ffa8d14bae4b30a1e080406f9a7ffa114b1d4aa9e59b617
-
SSDEEP
768:8CBVEPV4ybDRGWYbIR4g+MZbxaROSo/h0sFzo57XBAMYz:9BebdGfbE4WbxSIqkzmXGHz
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a2fc63b4d9fd3668b3ad28addd07e1d4_JaffaCakes118
Files
-
a2fc63b4d9fd3668b3ad28addd07e1d4_JaffaCakes118.exe windows:4 windows x86 arch:x86
0c1e0b4890cc87424a0fd0132621e9be
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LoadLibraryA
ExitProcess
GetProcAddress
Sections
UPX0 Size: 36KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.avc Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE