Behavioral task
behavioral1
Sample
f9ef3eb724ce79eaf71b56e2c0323eee_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
f9ef3eb724ce79eaf71b56e2c0323eee_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f9ef3eb724ce79eaf71b56e2c0323eee_JaffaCakes118
-
Size
41KB
-
MD5
f9ef3eb724ce79eaf71b56e2c0323eee
-
SHA1
91d02c68215ee49634de54ae3462314c14deadcf
-
SHA256
7df10349364fd7a556a053b578b319146ae61a61ac581350c00772fcc7bdfd99
-
SHA512
32f737de618d31a4028294565dddab8ce679e2a39e6cb35697b6550e8e6a5d7865443056508f779363218435db9d81c8564aef52c0aba463d89db4ac3a5d81ff
-
SSDEEP
768:ErcDgpqUyJQrkdUTriZHsl8lDzZaAzkpNS09TXZcUOg3tcQ3dedwTEEB4h:EIDyCQCnNDz0SkTJZnh74WTEEBI
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource f9ef3eb724ce79eaf71b56e2c0323eee_JaffaCakes118 unpack001/out.upx
Files
-
f9ef3eb724ce79eaf71b56e2c0323eee_JaffaCakes118.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 128KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 38KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.t1 Size: 152KB - Virtual size: 150KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.d1 Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.r3 Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE