Behavioral task
behavioral1
Sample
ae6e14c389dfc3fade6e18b72e7008fc_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
ae6e14c389dfc3fade6e18b72e7008fc_JaffaCakes118
-
Size
34KB
-
MD5
ae6e14c389dfc3fade6e18b72e7008fc
-
SHA1
57c62638f4e397ff44667a29b248d3125cb2e649
-
SHA256
95a9dae39f6d8ca42d4b2bb91099a9d852de38fa94119ce0771557d83331eb03
-
SHA512
e6447492f203111ff3cc6af07b682288ce5d8c354279974fe31a865126d86b37a99777309bd5a307b0159cc1981f0b6d6f0b1fd16f07555fb68cc28a6b445d7d
-
SSDEEP
768:vKs/bg1Q7RCN/VgW9FyFvMZ279uqdaohR:vK4aN/SUklMZM9uqTR
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ae6e14c389dfc3fade6e18b72e7008fc_JaffaCakes118
Files
-
ae6e14c389dfc3fade6e18b72e7008fc_JaffaCakes118.exe windows:4 windows x86 arch:x86
5a676d510a2d325fe7570ae1e8b6a270
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateProcessA
DeleteFileA
CreateFileA
lstrcmpA
ReadProcessMemory
OpenProcess
GetVersionExA
lstrcpyA
GetUserDefaultLangID
CreateMutexA
OpenMutexA
CreateThread
GetModuleHandleA
lstrcpynA
lstrlenA
CopyFileA
lstrcatA
GetFullPathNameA
GetStartupInfoA
GetCommandLineA
GetVersion
ExitProcess
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
HeapDestroy
HeapCreate
VirtualFree
HeapFree
RtlUnwind
WriteFile
GetCPInfo
GetACP
GetOEMCP
HeapAlloc
VirtualAlloc
HeapReAlloc
GetProcAddress
LoadLibraryA
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
Sections
UPX0 Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.avp Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE