Behavioral task
behavioral1
Sample
c0a9a951a9887dde16368067e1d03c94_JaffaCakes118.exe
Resource
win7-20240729-en
General
-
Target
c0a9a951a9887dde16368067e1d03c94_JaffaCakes118
-
Size
249KB
-
MD5
c0a9a951a9887dde16368067e1d03c94
-
SHA1
8f9bb1ab1141fd454b75e36d6d1d55fe65cc2189
-
SHA256
74537b9ff21e1156dc4ca4aebaa0c3e585b9df11196cc301de3851489dd77066
-
SHA512
e525dfadc731dd6354365048c72cf6803b22d6e14fa0760fa6a223487adcfab0a274956e6b7bbfaae4e4db9a61402853706dd9c55b0dc856c30f5cafaa3fb404
-
SSDEEP
6144:UGgC+89/ptMahw+018xru7chtrxKXk3CU1zBNqVAIKTT8Jnf:UGA6ptMGr014rxKU3Ccz3qVAIET8Jnf
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c0a9a951a9887dde16368067e1d03c94_JaffaCakes118
Files
-
c0a9a951a9887dde16368067e1d03c94_JaffaCakes118.exe windows:4 windows x86 arch:x86
6ff17e15b4dd569b039973ccf414da18
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
CharPrevA
CharUpperW
CharNextA
CharUpperA
oleaut32
SysStringByteLen
VariantCopy
VariantClear
SysFreeString
SysAllocString
advapi32
RegQueryValueExA
RegCloseKey
RegOpenKeyExA
msvcrt
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
__p___initenv
exit
_XcptFilter
_exit
?terminate@@YAXXZ
_onexit
__dllonexit
??1type_info@@UAE@XZ
_except_handler3
_beginthreadex
fprintf
memset
memcpy
fputc
fputs
fflush
fgetc
fclose
_iob
free
malloc
memmove
strlen
memcmp
_purecall
__CxxFrameHandler
_CxxThrowException
_isatty
_fileno
kernel32
VirtualAlloc
GetTickCount
VirtualFree
WaitForSingleObject
SetEvent
InitializeCriticalSection
OpenFileMappingA
GetProcessTimes
LocalFree
MapViewOfFile
UnmapViewOfFile
OpenEventA
GetStdHandle
GetSystemTime
SystemTimeToFileTime
FileTimeToDosDateTime
GetModuleHandleA
GlobalMemoryStatus
GetSystemInfo
FileTimeToSystemTime
CompareFileTime
GetProcAddress
GetCurrentProcess
SetEndOfFile
WriteFile
ReadFile
SetFilePointer
GetFileSize
CreateFileA
FindNextFileW
FindNextFileA
FindFirstFileW
FindFirstFileA
FindClose
GetTempFileNameW
GetTempFileNameA
GetTempPathW
GetTempPathA
SearchPathW
SearchPathA
SetConsoleCtrlHandler
FileTimeToLocalFileTime
GetCommandLineW
SetFileApisToOEM
GetVersionExA
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
MultiByteToWideChar
WideCharToMultiByte
GetLastError
FreeLibrary
LoadLibraryExA
LoadLibraryA
AreFileApisANSI
GetModuleFileNameA
GetCurrentDirectoryW
FormatMessageA
FormatMessageW
GetWindowsDirectoryA
GetWindowsDirectoryW
CloseHandle
SetFileTime
CreateFileW
SetLastError
SetFileAttributesA
RemoveDirectoryA
MoveFileA
SetFileAttributesW
RemoveDirectoryW
MoveFileW
CreateDirectoryA
CreateDirectoryW
DeleteFileA
DeleteFileW
lstrlenA
GetFullPathNameA
GetFullPathNameW
GetCurrentDirectoryA
SetCurrentDirectoryA
SetCurrentDirectoryW
Sections
.text Size: 112KB - Virtual size: 112KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 22KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 808B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.UPX0 Size: 104KB - Virtual size: 252KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE