Behavioral task
behavioral1
Sample
01019eb389f1f43ebb818898ac500da3_JaffaCakes118.exe
Resource
win7-20240611-en
General
-
Target
01019eb389f1f43ebb818898ac500da3_JaffaCakes118
-
Size
566KB
-
MD5
01019eb389f1f43ebb818898ac500da3
-
SHA1
88df6af3f7816bb089976f24b51ec66cb9d91dbe
-
SHA256
81db062795d4a26336bebad86e80025d7fac48f3832bc8391da43b4ac40d09b2
-
SHA512
481cb901754470ebd764950886871dd124d50ce423f82701a00fedbdc97ee1050ba2e6d38f02954e2e5bda4c3b21b81df32c60779641d3ae7f63653467476692
-
SSDEEP
12288:2I6SBAu/H93upKwuN2f/+mhMfV/hPYC/oB7UE8B0C+IUWqNm6ghVo:16SBbf93u6k+QM99j/i7rKZ+IUvNmfI
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource 01019eb389f1f43ebb818898ac500da3_JaffaCakes118 unpack001/out.upx
Files
-
01019eb389f1f43ebb818898ac500da3_JaffaCakes118.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 832KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 453KB - Virtual size: 456KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 112KB - Virtual size: 112KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 892KB - Virtual size: 888KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 124KB - Virtual size: 120KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 48KB - Virtual size: 100KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 156KB - Virtual size: 153KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ