Behavioral task
behavioral1
Sample
d587b5ebd828f8aaf2ff185f46012678_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
d587b5ebd828f8aaf2ff185f46012678_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d587b5ebd828f8aaf2ff185f46012678_JaffaCakes118
-
Size
283KB
-
MD5
d587b5ebd828f8aaf2ff185f46012678
-
SHA1
42cdc129484b4f21af66108bed4df4469dc45203
-
SHA256
54f78aef046546ec0bc5661cb00f7ce8ba442654c2063552dd5c273b4b49687f
-
SHA512
0252452def1895b9c7a54507e08e3847480e37c12f212cbc7f36744fecf0552be9c8b6a992933bd780f19ad3b75b98c75adeca565629e62520e5e7408c4a7515
-
SSDEEP
6144:STfHCezJu7sx2GBxuH7XhkEx5Y504juDDQJ+zHXuItiGi04TSUZ/:w3zJu7sgGBxuHbhajaD0gruqidN
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d587b5ebd828f8aaf2ff185f46012678_JaffaCakes118
Files
-
d587b5ebd828f8aaf2ff185f46012678_JaffaCakes118.exe windows:4 windows x86 arch:x86
e7f14bbda50f76c1622863574f64d125
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Imports
kernel32
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
advapi32
LsaClose
crypt32
CryptUnprotectData
ole32
CoTaskMemFree
oleaut32
SysFreeString
pstorec
PStoreCreateInstance
rasapi32
RasEnumEntriesA
shell32
SHGetSpecialFolderPathA
user32
ToAscii
Sections
UPX0 Size: - Virtual size: 64KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 269KB - Virtual size: 280KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rorg Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE