Behavioral task
behavioral1
Sample
0d7ee12304dee2d8539644ed9f6db994_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
0d7ee12304dee2d8539644ed9f6db994_JaffaCakes118.exe
Resource
win10v2004-20240910-en
General
-
Target
0d7ee12304dee2d8539644ed9f6db994_JaffaCakes118
-
Size
17KB
-
MD5
0d7ee12304dee2d8539644ed9f6db994
-
SHA1
ceb46a6eb7d93ccfd15a7b3417c581fcf60f1408
-
SHA256
e861a948e14fdc6fcde1d202824de6257c8e7cf8bca6964fb6a64aac85bbfc97
-
SHA512
80280884ad099a57ac0861b4c6e323a0da5b00daf7c89d40fc81744cfacc9a3867c121c1b20693506c5e76010e8d60092af4dd31d35d399fd5284adf536b3419
-
SSDEEP
96:FMFlfOkBqzSw1/JnrLH1vHYeSrVfSfyCFqOl9MOqA+:FMvOkxwrLHNjSrVK6CFqOnM5
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0d7ee12304dee2d8539644ed9f6db994_JaffaCakes118
Files
-
0d7ee12304dee2d8539644ed9f6db994_JaffaCakes118.exe windows:1 windows x86 arch:x86
956e3b7d9fb8f2e1adaf653f1345a0c1
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindFirstFileA
GetCurrentProcess
GetModuleFileNameA
GetModuleHandleA
CloseHandle
GetProcAddress
GetSystemDirectoryA
GetWindowsDirectoryA
CopyFileA
OpenProcess
Process32First
Process32Next
RtlUnwind
CreateMutexA
VirtualAllocEx
VirtualFreeEx
WaitForSingleObject
CreateRemoteThread
WriteProcessMemory
CreateToolhelp32Snapshot
advapi32
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
crtdll
__GetMainArgs
_strlwr
exit
raise
signal
strcat
strcmp
strcpy
strlen
Sections
UPX0 Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.avp Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE