Behavioral task
behavioral1
Sample
234952a418b24d646da4d13f27d4e10a_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
234952a418b24d646da4d13f27d4e10a_JaffaCakes118
-
Size
34KB
-
MD5
234952a418b24d646da4d13f27d4e10a
-
SHA1
07ca117d1b2b78758aaa2cc658ebcba3deb6fe5b
-
SHA256
e81ba5c07470337c4fba3a6275c2dc1a89c800406638915d02fb4074a9d24ead
-
SHA512
621cf01154d2aecbd0773db5ace7a2a7ca13e31386cb521356437eeb79a7269b75470e6e1821f0ab3622dabfcdd87b0d473bfa47125f108a84d299306b9f169b
-
SSDEEP
768:QaIGu+hobs32Rt7xMDDOjGQdXkxfU1wEQyQh9+eBNA/5SPEmV43s:t7/hoIQtFMPOjV0x1PyQ7+MywDX
Malware Config
Extracted
pony
http://inmrvogurin.ru/SY/test/gate.php
Signatures
Files
-
234952a418b24d646da4d13f27d4e10a_JaffaCakes118.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 68KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 32KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 70KB - Virtual size: 69KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 256B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 18KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE