Behavioral task
behavioral1
Sample
02e96814eee4cbc65f0a114420890023_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
02e96814eee4cbc65f0a114420890023_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
02e96814eee4cbc65f0a114420890023_JaffaCakes118
-
Size
126KB
-
MD5
02e96814eee4cbc65f0a114420890023
-
SHA1
eba41bd9f63d60a6264d331c30056a0e751c1963
-
SHA256
b072891afd8904d4526fad2f7fa48d695f71d8133fa89ef5e588251432c047c8
-
SHA512
8b92e8d400a4e0f5156eb5ed0a99c4eaf958ead416002220b28e0ee4077d7da06954a8186ea21908acbd4f8ef8f57274fed55ff837a82d9e6f2f01ceb30fef8e
-
SSDEEP
3072:ttHw6mqTPHmFX/0G6OOVR5/AMnVNmmbKjCeiHP73SQd4JTk:ttQK+Xd+/PnPmmbKQbSQdGT
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource 02e96814eee4cbc65f0a114420890023_JaffaCakes118 unpack001/out.upx
Files
-
02e96814eee4cbc65f0a114420890023_JaffaCakes118.exe windows:5 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 180KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 124KB - Virtual size: 128KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:5 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 117KB - Virtual size: 117KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 174KB - Virtual size: 175KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE