Behavioral task
behavioral1
Sample
1561458c7d4106abe3c0e3ae8e83bcb1_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
1561458c7d4106abe3c0e3ae8e83bcb1_JaffaCakes118
-
Size
14KB
-
MD5
1561458c7d4106abe3c0e3ae8e83bcb1
-
SHA1
9e377d2d3a62ef4aae737a451336e09c5d4bd218
-
SHA256
7e0deb1044406804b3985714656bcbcec7a374c94efd38349ed662b445944e18
-
SHA512
8dc82d1c9b1b19ac7b2813c3d89f01b7b33a0b8475ea7a3e9dc4a180b44ef56bb72afc1141295c596f44b43f79476b383e35736c64363cd40a18041321e53b43
-
SSDEEP
96:KOrUbjfKqBs0sbEkuGx6gMCvnJEVP4HUzoIkh28:KicfKsslT6BEnqVP4HGoIkh28
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1561458c7d4106abe3c0e3ae8e83bcb1_JaffaCakes118
Files
-
1561458c7d4106abe3c0e3ae8e83bcb1_JaffaCakes118.exe windows:4 windows x86 arch:x86
6c86aba8f7791384c326f49764944921
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ResumeThread
CreateProcessA
SetThreadPriority
GetCurrentThread
SetPriorityClass
GetCurrentProcess
lstrcatA
lstrcpyA
GetEnvironmentVariableA
GetShortPathNameA
GetModuleFileNameA
SetFileAttributesA
Sleep
GetTempPathA
GetProcAddress
LoadLibraryA
CreateThread
CloseHandle
GetLastError
CreateMutexA
WinExec
CopyFileA
lstrcmpiA
lstrcmpA
msvcrt
_controlfp
_except_handler3
__set_app_type
__p__fmode
__p__commode
exit
fclose
fputs
fopen
printf
_exit
_XcptFilter
__p___initenv
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
user32
IsWindow
GetWindowTextA
SendMessageA
EnumChildWindows
GetForegroundWindow
GetClassNameA
GetWindowLongA
Sections
UPX0 Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.avc Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE