Behavioral task
behavioral1
Sample
295b9e3379817c0b77286ab069e30be9_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
295b9e3379817c0b77286ab069e30be9_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
295b9e3379817c0b77286ab069e30be9_JaffaCakes118
-
Size
182KB
-
MD5
295b9e3379817c0b77286ab069e30be9
-
SHA1
11b3be4af83fbdf6dccd4c86485db56e8013843e
-
SHA256
ee2e4d34afb736787b329e2170a0719748a88310695435bfb65ab85bdea5cb9f
-
SHA512
fa1c2f10dcd44036dd921de0a5bda3be3fc746bbdbb2177d64773f1529b565efd51df2fec079a19f24e0338338ff497987d9f961de13a1a9f1746d80a3f37f57
-
SSDEEP
3072:SPZOhQw48+SjZYIujgkK0+3Yuhts/skDzNHDJh0pPipqqsbEDP9GMtlg3Y:Ew47KaQDheUgzNH1GYpqqsMP9GNY
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 295b9e3379817c0b77286ab069e30be9_JaffaCakes118
Files
-
295b9e3379817c0b77286ab069e30be9_JaffaCakes118.exe windows:4 windows x86 arch:x86
f433e7fcc51e68080022754836705744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_ISOLATION
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleA
LoadLibraryA
GetProcAddress
ExitProcess
VirtualAlloc
VirtualFree
user32
MessageBoxA
Sections
UPX0 Size: - Virtual size: 268KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 127KB - Virtual size: 128KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
qfcv4f0w Size: - Virtual size: 52KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
5v0157mg Size: 53KB - Virtual size: 56KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
n1ayd8yk Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ