Behavioral task
behavioral1
Sample
2ff8c18e33296ededb6a617b7a9571d9_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2ff8c18e33296ededb6a617b7a9571d9_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
2ff8c18e33296ededb6a617b7a9571d9_JaffaCakes118
-
Size
82KB
-
MD5
2ff8c18e33296ededb6a617b7a9571d9
-
SHA1
26c68200bcc40ccfa17420f874962997316a027c
-
SHA256
720eba0d47568c24a62d5d9596a526765e48a42b2b1553bfb3822b6334812303
-
SHA512
9a3a427db333b5080de39c85d270508449ccee7e902159ac0e8579f1649fdcdbb27862014525ceb6ed9963aff170dd1a2450db7024d65852191a9cc812963280
-
SSDEEP
1536:hw0b1tZGvA117sifXzJGBfmmrE6nouy8qbL8Ik3stYOV1rSjYMsIJXri:hn5fWA117ToM/iout1ctJVNSsEi
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2ff8c18e33296ededb6a617b7a9571d9_JaffaCakes118
Files
-
2ff8c18e33296ededb6a617b7a9571d9_JaffaCakes118.exe windows:4 windows x86 arch:x86
f433e7fcc51e68080022754836705744
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleA
LoadLibraryA
GetProcAddress
ExitProcess
VirtualAlloc
VirtualFree
user32
MessageBoxA
Sections
UPX0 Size: - Virtual size: 92KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 42KB - Virtual size: 44KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
z.i1ghzs Size: - Virtual size: 72KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
q69zkqoy Size: 70KB - Virtual size: 72KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
i3n0t6c8 Size: 512B - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE