Behavioral task
behavioral1
Sample
0e856533dc47c9ea3fa3deda71cdc5a1_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
0e856533dc47c9ea3fa3deda71cdc5a1_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
0e856533dc47c9ea3fa3deda71cdc5a1_JaffaCakes118
-
Size
12KB
-
MD5
0e856533dc47c9ea3fa3deda71cdc5a1
-
SHA1
591b06cb1dbaefcb6261e5a0c964f12cb7c089ab
-
SHA256
17a8165e920b1782dbda3dd08c99c43ef119dc10e0624f1b0a9695e81c809340
-
SHA512
556bf8bcfd37eea16939bdefb6767ee84cc1899e26904f9f84c59c55dad327915ab6269356ce48eb9866c929ec5d746f5a2d542fbed6afa03317b0c493a68d4e
-
SSDEEP
192:TfqHku2k9EHbK80gnQaf/yqTHI22nDNGOWXRkSPP5qrKTnWr9fb+QFBcs7L41uTI:TCHku2KE2EnQaf/M22DNGeSPPdcbpFB6
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource 0e856533dc47c9ea3fa3deda71cdc5a1_JaffaCakes118 unpack001/out.upx
Files
-
0e856533dc47c9ea3fa3deda71cdc5a1_JaffaCakes118.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 32KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 9KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 28KB - Virtual size: 25KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ