Behavioral task
behavioral1
Sample
a7564efc68d7fdc22c52b01b7f4b36ed_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
a7564efc68d7fdc22c52b01b7f4b36ed_JaffaCakes118
-
Size
748KB
-
MD5
a7564efc68d7fdc22c52b01b7f4b36ed
-
SHA1
5af523ca714aff0a16c756a7b4515b1ff75449a5
-
SHA256
f8277735d4281db151649b69175057a9ddc63d9971f2ec748664f15ebe076d11
-
SHA512
41566583e2664f8aceaa45823b87afc1d415c45688c6d6f21c1a52d1ed24be1ca10af7979b1d7f7ae9c27cc4b61c09478f6b65d0f73d7914123f9cd48ec5da42
-
SSDEEP
768:WarMZzed3+VUzTiaf37SJRfsGjsjYCaFqHeCEQqYuDHibQk76baz5hpWj82Ld7I3:WG2/sTSsGjCaq0+Uk76badhITpI4E
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a7564efc68d7fdc22c52b01b7f4b36ed_JaffaCakes118
Files
-
a7564efc68d7fdc22c52b01b7f4b36ed_JaffaCakes118.exe windows:4 windows x86 arch:x86
1b985173044f6729df3ea2d4d5955e3c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LeaveCriticalSection
DeleteCriticalSection
InterlockedDecrement
EnterCriticalSection
MultiByteToWideChar
lstrlenA
WideCharToMultiByte
InitializeCriticalSection
Sleep
ReleaseMutex
TerminateThread
CreateThread
ExitThread
GetLastError
CreateMutexA
GetVersionExA
InterlockedIncrement
CloseHandle
GetCurrentThreadId
OpenProcess
SetEnvironmentVariableA
ExitProcess
HeapFree
GetExitCodeProcess
HeapAlloc
GetStringTypeA
CreateFileA
GetStringTypeW
SetStdHandle
GetEnvironmentStringsW
FlushFileBuffers
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetEnvironmentStrings
UnhandledExceptionFilter
LCMapStringW
GetModuleFileNameA
GetFileType
GetStdHandle
LCMapStringA
SetFilePointer
IsBadWritePtr
SetHandleCount
VirtualFree
HeapCreate
VirtualAlloc
HeapSize
WriteFile
HeapDestroy
SetEndOfFile
LoadLibraryA
GetProcAddress
GetCommandLineA
MoveFileA
GetStartupInfoA
CompareStringA
GetOEMCP
GetACP
CompareStringW
GetCPInfo
GetWindowsDirectoryA
IsBadCodePtr
IsBadReadPtr
SetUnhandledExceptionFilter
CreateProcessA
WaitForSingleObject
GetVersion
GetDriveTypeA
GetModuleHandleA
ReadFile
TerminateProcess
GetCurrentProcess
GetFileAttributesA
DeleteFileA
RtlUnwind
GetTimeZoneInformation
GetSystemTime
GetLocalTime
HeapReAlloc
GetCurrentDirectoryA
GetFullPathNameA
advapi32
RegSetValueExA
RegOpenKeyExA
RegCloseKey
RegQueryValueExA
ole32
CoInitialize
CoUninitialize
CoGetClassObject
oleaut32
shell32
ShellExecuteA
user32
DestroyWindow
MoveWindow
PostMessageA
IsWindow
SetWindowLongA
GetWindowLongA
FindWindowExA
PostQuitMessage
FindWindowA
GetWindowTextA
WaitForInputIdle
EnumDesktopWindows
CreateDesktopA
GetParent
GetClassNameA
CreateWindowExA
GetThreadDesktop
SetThreadDesktop
KillTimer
SetTimer
GetMessageA
DispatchMessageA
GetWindowThreadProcessId
TranslateMessage
CloseDesktop
wininet
InternetOpenA
InternetSetOptionA
InternetOpenUrlA
InternetCloseHandle
InternetReadFile
HttpQueryInfoA
ws2_32
Sections
UPX0 Size: 744KB - Virtual size: 744KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.avp Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE