Behavioral task
behavioral1
Sample
1c516f09df5b62f0d99975e4b6d1d3ce_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1c516f09df5b62f0d99975e4b6d1d3ce_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
1c516f09df5b62f0d99975e4b6d1d3ce_JaffaCakes118
-
Size
21KB
-
MD5
1c516f09df5b62f0d99975e4b6d1d3ce
-
SHA1
4ab4768dfb12725e94ae61ff9f3c64a3085290f5
-
SHA256
79c97209506d7779311b25c69668fe1e3c8388f9768f79d7f7813da55f5c21ce
-
SHA512
45dcdd0a275b2ad835ed9b3cc3add792e87473419bbf95c97107da384d6a5a70b07b8321999d55caf88d6579ba8b4a0d821854510b1edfb7cd752e37a8b7b9c2
-
SSDEEP
384:LX25t+K7MPxAeRPJFQCBf48+jMGvQ3OdXroO2T1BBwg4/MN38NJZ8DtnKCv7B2s:Lm5gDPmiPv7BfEMl3OdbB613wglN3qJ9
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource 1c516f09df5b62f0d99975e4b6d1d3ce_JaffaCakes118 unpack001/out.upx
Files
-
1c516f09df5b62f0d99975e4b6d1d3ce_JaffaCakes118.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 56KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 17KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 52KB - Virtual size: 48KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ