Behavioral task
behavioral1
Sample
d42a808f578a640205dc93ea8182599d_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
d42a808f578a640205dc93ea8182599d_JaffaCakes118
-
Size
81KB
-
MD5
d42a808f578a640205dc93ea8182599d
-
SHA1
35999733d66907b83c86aee694a6c75342fc3056
-
SHA256
c3410400b9e7aeae49c0f1d6ff5880732b98cf28a9f5713e90973ca4149dc430
-
SHA512
fdfdafb1bda8fad6a1d07bf42dc087c1701a49ca2b4fa2b29d31f7052b6ba8f8008d71759cbffb473b8e07ac79987a5d48afd4b242c6f2a4c87790241d38c9ed
-
SSDEEP
1536:FxyDa85p2248TLuy3Xyow2c7FzWHlXAfW737NhsQaRLxo:FYB48TLuy3zw2cBCHlXAohKRLxo
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d42a808f578a640205dc93ea8182599d_JaffaCakes118
Files
-
d42a808f578a640205dc93ea8182599d_JaffaCakes118.exe windows:4 windows x86 arch:x86
9c8decf3582072f6edfc385a689f44f4
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
CreateDirectoryA
CreateFileA
DeleteFileA
ExitProcess
FreeLibrary
GetCommandLineA
GetFileTime
GetModuleHandleA
GetProcAddress
GetSystemDirectoryA
GetTempPathA
GetWindowsDirectoryA
LoadLibraryA
lstrcatA
lstrcmpiA
RemoveDirectoryA
SetFileTime
VirtualAlloc
VirtualFree
WriteFile
Sections
UPX0 Size: - Virtual size: 100KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 13KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
pebundle Size: 56KB - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
pebundle Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE