Behavioral task
behavioral1
Sample
07a61630ccf2c54dfe6a7c536b3d8346_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
07a61630ccf2c54dfe6a7c536b3d8346_JaffaCakes118
-
Size
288KB
-
MD5
07a61630ccf2c54dfe6a7c536b3d8346
-
SHA1
1bcdd8b9ad99f331b33892e9b6df9e70322ebbba
-
SHA256
3e78235ccfa480beabf0b5ae50dbdb1cc5957b5ea13b8f73cc771bfea40094ff
-
SHA512
36fc0b5e9b7fa5afedb2038ecb611ce64fc8b58195f26c40e511df59964346872eabbadd0a8cd72805a6b48e9015f5c47f2d3fbce55be8040eac024061b1e4ba
-
SSDEEP
6144:NBvH5DnNzngwMIpsoUysqi+E8fudLc/PhH5mUa:XH5tnDFeoDtm1CHhHAUa
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 07a61630ccf2c54dfe6a7c536b3d8346_JaffaCakes118
Files
-
07a61630ccf2c54dfe6a7c536b3d8346_JaffaCakes118.exe windows:4 windows x86 arch:x86
9c8decf3582072f6edfc385a689f44f4
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
CreateDirectoryA
CreateFileA
DeleteFileA
ExitProcess
FreeLibrary
GetCommandLineA
GetFileTime
GetModuleHandleA
GetProcAddress
GetSystemDirectoryA
GetTempPathA
GetWindowsDirectoryA
LoadLibraryA
lstrcatA
lstrcmpiA
RemoveDirectoryA
SetFileTime
VirtualAlloc
VirtualFree
WriteFile
Sections
UPX0 Size: - Virtual size: 32KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 9KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 11KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE