Behavioral task
behavioral1
Sample
15efde376284ed28758e7c70b21ab0ce_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
15efde376284ed28758e7c70b21ab0ce_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
15efde376284ed28758e7c70b21ab0ce_JaffaCakes118
-
Size
101KB
-
MD5
15efde376284ed28758e7c70b21ab0ce
-
SHA1
278474ef785bde92f341ae80ba7dbc071cdf01fb
-
SHA256
c5f06570a01074b6ebb8c70fd8a259c7d290850a86d57970bcc34cc131e5ac4d
-
SHA512
e69e92f6d5a48eb6870d1adadc44098e681b254f43b0dd4082fe08f8d7edbd50a19f061900ef7dc429336d21b983106c04fe919d295a7af218427c1effb9f2d9
-
SSDEEP
1536:nohTzd0VaSxaAtYpOMF1qibRjFwVHwuNPHp9/ggu/CpGXnd7Kz3npUJIS8FbQjzT:opd0RYoMFMiCV/NPn/gg6CEMDpgoy
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource 15efde376284ed28758e7c70b21ab0ce_JaffaCakes118 unpack001/out.upx
Files
-
15efde376284ed28758e7c70b21ab0ce_JaffaCakes118.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 212KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 60KB - Virtual size: 64KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 40KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 248KB - Virtual size: 245KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ