Behavioral task
behavioral1
Sample
10967ff0b68cfaec779c1a478bdce3a1_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
10967ff0b68cfaec779c1a478bdce3a1_JaffaCakes118
-
Size
7KB
-
MD5
10967ff0b68cfaec779c1a478bdce3a1
-
SHA1
27ab3f5ad97220a68d70f58e2ffd9bc58f94cb58
-
SHA256
5a77edc67b3bbafc39c81e9af025721883ccf319070e792c3c8a70d3bbefc3cc
-
SHA512
1c2fcf91f13847e22c9930aef5a2cc876f7722ea6232c6257002eaaabb84aed7972023bef955ea0789b0ed49caa07970a5ef4ff3e0a80b74be32417b0f4ce736
-
SSDEEP
192:BX4TJJTXVkEdeHH0sq6MY2+nusTqEliu1a:NiTXVkE+0h6MYx1TqLug
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 10967ff0b68cfaec779c1a478bdce3a1_JaffaCakes118
Files
-
10967ff0b68cfaec779c1a478bdce3a1_JaffaCakes118.exe windows:4 windows x86 arch:x86
b46ead522a346c3a0732882852f5cd15
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcAddress
LoadLibraryA
user32
GetDlgItem
Sections
UPX0 Size: - Virtual size: 20KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 2KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE