Behavioral task
behavioral1
Sample
2805f77102145a30d3d38bf95ab7b799_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2805f77102145a30d3d38bf95ab7b799_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
2805f77102145a30d3d38bf95ab7b799_JaffaCakes118
-
Size
140KB
-
MD5
2805f77102145a30d3d38bf95ab7b799
-
SHA1
e8c30dc8bc9f52560c13780d7aa6e55065932ba7
-
SHA256
e49de9d1eef8717ff069470dba8b016be775c5d2068c7e00e81fe1411cca130e
-
SHA512
d3d48033997afddbbd47d4af7f860b10c349dcc84ee443e668e4ec450b15582849cc3fd6ce302f8d6b3b752113414808357d224a633336821eed65f1480b3616
-
SSDEEP
3072:x81FpIxQSCnQ5tXKHUJVvmi5Zv1uCDe9afFVFHWMn5R:sIYcXKcsmvgC4sVFHWMn3
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource 2805f77102145a30d3d38bf95ab7b799_JaffaCakes118 unpack001/out.upx
Files
-
2805f77102145a30d3d38bf95ab7b799_JaffaCakes118.exe windows:5 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 188KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 139KB - Virtual size: 140KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:5 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 130KB - Virtual size: 130KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 183KB - Virtual size: 184KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE