Behavioral task
behavioral1
Sample
d30e621c8bcde06105ade9bf1da6d411_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d30e621c8bcde06105ade9bf1da6d411_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d30e621c8bcde06105ade9bf1da6d411_JaffaCakes118
-
Size
58KB
-
MD5
d30e621c8bcde06105ade9bf1da6d411
-
SHA1
e3a85de99ae4c1a27b523ee426d17a8f92db7d05
-
SHA256
706410436c8816580592565e2270ebe20684246365b35191e9bec7f8cd2b5d7d
-
SHA512
d7e4d4ee42632075c2dd2b36189a9f3b3bae7f986b854787700929ca09bf3f23f0a740d0de64c88e875da2bf21a4e38ace9a570bdfe54c9be810afc343407ead
-
SSDEEP
1536:9MhmdkLTcG592/Ccvcd2pjJuNmxM3Y/lM:9UokLTcGr2/CcNpj3xM3YlM
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d30e621c8bcde06105ade9bf1da6d411_JaffaCakes118
Files
-
d30e621c8bcde06105ade9bf1da6d411_JaffaCakes118.exe windows:4 windows x86 arch:x86
27eac643b5cdc8a66d5c497b14ba29e1
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleFileNameW
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
IsDebuggerPresent
SetUnhandledExceptionFilter
GetCurrentProcess
QueryPerformanceCounter
InitializeCriticalSection
SetErrorMode
GetLastError
RemoveDirectoryW
GetVolumeInformationW
LoadLibraryW
FreeLibrary
Sleep
CreateDirectoryW
CreateMutexA
VirtualAllocEx
version
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
advapi32
RegOpenKeyExW
RegSetValueExW
RegDeleteKeyW
RegDeleteValueW
RegCloseKey
RegQueryValueExW
RegCreateKeyExW
loadperf
UpdatePerfNameFilesW
UnloadPerfCounterTextStringsA
user32
SetWindowTextW
LoadImageA
LoadMenuW
DialogBoxIndirectParamA
CopyRect
PostQuitMessage
GetMenuItemInfoW
ActivateKeyboardLayout
LoadImageW
ShowCursor
LoadMenuIndirectA
MonitorFromRect
EnumClipboardFormats
SetCursorPos
InvalidateRect
RegisterClassA
WaitMessage
PeekMessageW
GetScrollPos
OffsetRect
DialogBoxIndirectParamW
GetDlgItemTextW
EnableWindow
colbact
DllRegisterServer
Sections
UPX0 Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.text Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.C Size: 1024B - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.pMTqU Size: 4KB - Virtual size: 62KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.Dnhw Size: 2KB - Virtual size: 296KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.edata Size: 10KB - Virtual size: 59KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.KjNq Size: 2KB - Virtual size: 318KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 6KB - Virtual size: 290KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 10KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ