Behavioral task
behavioral1
Sample
FileLock/?????.url
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
FileLock/?????.url
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
FileLock/FileLock.exe
Resource
win7-20240220-en
Behavioral task
behavioral4
Sample
FileLock/FileLock.exe
Resource
win10v2004-20240226-en
General
-
Target
085715a17754e23354fe329670f8132a_JaffaCakes118
-
Size
879KB
-
MD5
085715a17754e23354fe329670f8132a
-
SHA1
7eb30c892be0fddb9af10820fca7557a5259985b
-
SHA256
0d7b4f1504225bf7d490f24bcada0e7412c25017e290e7c4d62dc60049cc2151
-
SHA512
15ae8ab5f502651891d593d1895e0ee7c3870c1cc55de323f2d90687680ffeb29bc787f8be3e6b7a5ae8d7587df7258c3aaee66763f0536cde5f3d36449f7894
-
SSDEEP
24576:1ropXYPAxWBFud5/rs4L+98pqZ5tGvhtrLGMAN:1cXYPAYP4TpS9mW5UhVKD
Malware Config
Signatures
-
resource yara_rule static1/unpack001/FileLock/FileLock.exe aspack_v212_v242 -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/FileLock/FileLock.exe
Files
-
085715a17754e23354fe329670f8132a_JaffaCakes118.zip
-
FileLock/?????.txt
-
FileLock/?????.url
-
FileLock/FileLock.exe.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 18KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ecode Size: 7KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.NoyFnr Size: 39KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.adata Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE