Behavioral task
behavioral1
Sample
3673e7ff4524d67db81057898b9c9e57_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
3673e7ff4524d67db81057898b9c9e57_JaffaCakes118
-
Size
468KB
-
MD5
3673e7ff4524d67db81057898b9c9e57
-
SHA1
74b56afd1ed847b75a7d7b40ee445d3ae190bfdf
-
SHA256
b10ca135867fe190ee795f0d673d30a668910002b947feb0bbf57a7b4c5d038c
-
SHA512
a46c3c09fdf05e7d542d3fed39ca07b1216ee5e6740b6879407bc09f37fd6d7140aae44a1395064003b24daafd59f3f7d606490431fb6e002e8d842a28f31c19
-
SSDEEP
6144:55BUhgDqVwUTQgJUsC08as8x9PYZ4UMJCXqcpsYUQgr3x0S9QCaI8D2gfiCtZ/6W:VDqPpJU1aBDwyJCeYUVN0StavygqK
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3673e7ff4524d67db81057898b9c9e57_JaffaCakes118
Files
-
3673e7ff4524d67db81057898b9c9e57_JaffaCakes118.exe windows:4 windows x86 arch:x86
b03bf8a58d20b35a259e06165c9f41dd
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateFileMappingA
Sleep
GetCurrentThreadId
ExitProcess
lstrlenA
LoadLibraryA
SetEnvironmentVariableA
SetEndOfFile
GetOEMCP
GetACP
SetStdHandle
IsBadCodePtr
MapViewOfFile
CloseHandle
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
FlushFileBuffers
GetFileType
GetStdHandle
SetHandleCount
ReadFile
GetStringTypeW
UnmapViewOfFile
IsBadWritePtr
VirtualAlloc
GetLastError
CreateFileA
GetModuleHandleA
VirtualFree
HeapCreate
GetProcAddress
GetStringTypeA
HeapDestroy
GetEnvironmentVariableA
GetModuleFileNameA
GetVersionExA
GetCurrentProcess
GetComputerNameA
TerminateProcess
OpenProcess
GetLocalTime
IsBadReadPtr
GetCurrentProcessId
WideCharToMultiByte
GlobalFree
GlobalAlloc
MultiByteToWideChar
SetLastError
WriteFile
SetFilePointer
GetFileSize
DeleteFileA
EnterCriticalSection
InitializeCriticalSection
InterlockedExchange
DeleteCriticalSection
LeaveCriticalSection
InterlockedDecrement
InterlockedIncrement
RtlUnwind
RaiseException
HeapFree
HeapAlloc
GetTimeZoneInformation
GetSystemTime
MoveFileA
GetStartupInfoA
GetCommandLineA
GetVersion
GetSystemTimeAsFileTime
GetFileAttributesA
HeapReAlloc
LCMapStringA
LCMapStringW
GetCPInfo
CompareStringA
CompareStringW
HeapSize
TlsSetValue
TlsAlloc
TlsGetValue
SetUnhandledExceptionFilter
lstrcpyA
LoadLibraryA
VirtualAlloc
GetModuleFileNameA
ExitProcess
user32
LoadIconA
SetClassLongA
SetTimer
EndDialog
GetSystemMenu
DeleteMenu
EnableWindow
GetDlgItem
ShowWindow
KillTimer
IsWindowVisible
DialogBoxParamA
MessageBoxA
MoveWindow
SetDlgItemTextA
SetWindowLongA
GetWindowLongA
GetSystemMetrics
GetWindowRect
SetWindowPos
FindWindowA
GetWindowThreadProcessId
CreateDialogParamA
ClientToScreen
SetFocus
GetClientRect
SetWindowTextA
MessageBoxA
gdi32
CreateSolidBrush
comdlg32
GetOpenFileNameA
advapi32
RegSetValueExA
RegOpenKeyExA
shell32
ShellExecuteA
comctl32
ord17
psapi
GetModuleFileNameExA
ole32
OleInitialize
OleCreate
OleSetContainedObject
OleUninitialize
oleaut32
VariantInit
SysAllocString
VariantClear
Sections
.text Size: - Virtual size: 192KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 313KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.UPX0 Size: - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.UPX1 Size: 452KB - Virtual size: 449KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 108B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ