Behavioral task
behavioral1
Sample
77d670ad71f7081b4c477db5c7a86faf_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
77d670ad71f7081b4c477db5c7a86faf_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
77d670ad71f7081b4c477db5c7a86faf_JaffaCakes118
-
Size
28KB
-
MD5
77d670ad71f7081b4c477db5c7a86faf
-
SHA1
2a0f7450adb522818b5d7e8e88c7f09007b17a24
-
SHA256
ac447ed7cf2cdf392e3f9b8342a92346203648e944da18976c85acb9eedb1da3
-
SHA512
22d40d8cd5c2c2b29218ad93d5b50c151d54e795cc2052d7e7b4535f2581506932475ba505fc7c5784536570043929e16347d5864936beb44012281f6aba6f8c
-
SSDEEP
768:afpZGEbsU3G10GjZH3CXECsU8gXg9rbPMDP:ax0EbsU3G1x3CXE/UCrbQP
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource 77d670ad71f7081b4c477db5c7a86faf_JaffaCakes118 unpack001/out.upx
Files
-
77d670ad71f7081b4c477db5c7a86faf_JaffaCakes118.exe windows:5 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 44KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 23KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:5 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ