Behavioral task
behavioral1
Sample
af014ffed7ec842a8400627be4f77b0a_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
af014ffed7ec842a8400627be4f77b0a_JaffaCakes118
-
Size
133KB
-
MD5
af014ffed7ec842a8400627be4f77b0a
-
SHA1
1b1a3983bc45931581838ac8350badc6dac15702
-
SHA256
7acf61d75893ecbea71aab1267b612adc51a1540050ab2436bf5ec56f761abf2
-
SHA512
80d7bba9a6e57b3689fbfd49b91c9ccb5c93b736c10de32b917e42ca92ace32afa59883976722c127f06290628259170aa103806073d833e0914da738cc05181
-
SSDEEP
3072:EzjAHA+0Lz8hOnOQKgh64fA6HcATmmn/AOQC8rM:EzsHN0nQOOQ1VfpcomzOQ5M
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource af014ffed7ec842a8400627be4f77b0a_JaffaCakes118
Files
-
af014ffed7ec842a8400627be4f77b0a_JaffaCakes118.exe windows:4 windows x86 arch:x86
bbf4a2cb2b81042c84b7ced125e6683a
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
StrChrA
user32
PostThreadMessageA
MessageBoxA
advapi32
ControlService
ole32
CoCreateGuid
msvcrt
??3@YAXPAX@Z
kernel32.dll �
GetProcAddress
kernel32
GetModuleHandleA
LoadLibraryA
VirtualAlloc
GetModuleFileNameA
ExitProcess
Sections
.text Size: - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
xiao Size: - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.UPX0 Size: - Virtual size: 34KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_WRITE
.UPX1 Size: 69KB - Virtual size: 68KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 96B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ