Behavioral task
behavioral1
Sample
ad3d344a30bc5eba787b596e5ad982fa_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
ad3d344a30bc5eba787b596e5ad982fa_JaffaCakes118
-
Size
26KB
-
MD5
ad3d344a30bc5eba787b596e5ad982fa
-
SHA1
5943c0b9ed58a3e46fe60f426a7042ce3a880a99
-
SHA256
17e083d4e266b980b1bfc02a22a76e0b58dd4ee42e7ee965598aa06f90eed14f
-
SHA512
612cf0ddc45a6551a19d871e589192ec7f716ce2a79533a72847cfe96c0f9fb54cf2482e9b2afcbbd3c107066f6dac0eec43bf631d0d81688297bae3fdf13913
-
SSDEEP
96:nPuSYPgBkyvF4BIaOF4HtU8rC//tJC55VQ3UT34P:nHYoBkyWBIa64HC8rCNJKVQ3UT34P
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ad3d344a30bc5eba787b596e5ad982fa_JaffaCakes118
Files
-
ad3d344a30bc5eba787b596e5ad982fa_JaffaCakes118.exe windows:1 windows x86 arch:x86
bdbe8dffc558d126031e33d08d294df4
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Imports
kernel32
CreateProcessA
LoadLibraryA
ExitProcess
GetModuleHandleA
GetProcAddress
CreateRemoteThread
ResumeThread
Sleep
VirtualAllocEx
WriteFile
WriteProcessMemory
CreateFileA
CloseHandle
crtdll
__GetMainArgs
Sections
UPX0 Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.avc Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE