strcspn
Behavioral task
behavioral1
Sample
1bc08dc78bfc2972b7b532d1571ba7da_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1bc08dc78bfc2972b7b532d1571ba7da_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
1bc08dc78bfc2972b7b532d1571ba7da_JaffaCakes118
-
Size
7KB
-
MD5
1bc08dc78bfc2972b7b532d1571ba7da
-
SHA1
12a489481580fdc08108383ab1cf90b5cabc85d7
-
SHA256
0661db62e1c0ec181a8d30c2306f6f68bb19d84e610fea7370007a51a0f9678a
-
SHA512
a8fd682920f2d9d2f144e6cf13b093f9088b98687ff5f638fb7e624853a0af9379788408b876e0158cc08e85acf9ff133e79e9f4320d9b10380c3dbd46ceabef
-
SSDEEP
192:aZbYn7iyqI19S1U/uApKQIZdl77jHxMkMCcF0x:Rn7nqq9HmLZz7ZMkLci
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource 1bc08dc78bfc2972b7b532d1571ba7da_JaffaCakes118 unpack001/out.upx
Files
-
1bc08dc78bfc2972b7b532d1571ba7da_JaffaCakes118.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 84KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 6KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Exports
Exports
Sections
.text Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1KB - Virtual size: 67KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE