Behavioral task
behavioral1
Sample
betaling.Pdf_________________________________________________________________.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
betaling.Pdf_________________________________________________________________.exe
Resource
win10v2004-20240508-en
General
-
Target
18ce63aa39412753682cc9042e969a7b_JaffaCakes118
-
Size
182KB
-
MD5
18ce63aa39412753682cc9042e969a7b
-
SHA1
fe85c7cd89815ea8267459416d6fa99e513b9bb0
-
SHA256
16761db786fdafe3b21d7c726911e477a30185dfc34790b25b5a758abea99351
-
SHA512
7a734beffc9621954d211f165c72784ebe50345895809132d1f78aa0c1cff024fa66f792bb22f19083074d91ec760459d1b2901b44f57871b3afdc74b3a33bb3
-
SSDEEP
3072:bg2Sg0pp/Eb065Aztun6/iCAKt5AVS12eJRYq3jdrgTACT/VjJI:ag0p+bGztSOiCdDxkhq3Jr4w
Malware Config
Signatures
-
resource yara_rule static1/unpack001/betaling.Pdf_________________________________________________________________.exe upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/betaling.Pdf_________________________________________________________________.exe
Files
-
18ce63aa39412753682cc9042e969a7b_JaffaCakes118.zip
-
betaling.Pdf_________________________________________________________________.exe.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 1.0MB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 180KB - Virtual size: 180KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE