Behavioral task
behavioral1
Sample
18d8cd56ebd1154e41e24cf8dcbd3f75_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
18d8cd56ebd1154e41e24cf8dcbd3f75_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
18d8cd56ebd1154e41e24cf8dcbd3f75_JaffaCakes118
-
Size
1.0MB
-
MD5
18d8cd56ebd1154e41e24cf8dcbd3f75
-
SHA1
739552c3e95f4ac70285b35da23a028ebadd68bc
-
SHA256
d3b0f4911002497d413942bc4c2827782736490227471c8034d73dbcc4deaa9c
-
SHA512
f49018ac2fe02ce616c97460f23c950fb2437fbd094fb62becd7326e8a0d6a7ca208d02e2509d22d715f491449a22af72ee19faa340eddcde7a18403a7e224fa
-
SSDEEP
6144:Ssaru+c/dmPa1KPdKrquFWGdASygD+2aru+csdAPam6Be9M6zvgiyOI:SnC+wdO+BWGdAShD+pC+1dXeB8Q
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 18d8cd56ebd1154e41e24cf8dcbd3f75_JaffaCakes118
Files
-
18d8cd56ebd1154e41e24cf8dcbd3f75_JaffaCakes118.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Sections
UPX0 Size: 480KB - Virtual size: 480KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 232KB - Virtual size: 232KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 176KB - Virtual size: 176KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
pebundle Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
pebundle Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
pebundle Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
pebundle Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.adata Size: 116KB - Virtual size: 120KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE