Behavioral task
behavioral1
Sample
2e90d00a56c0ca0553c2ffcc7bae5fb1_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2e90d00a56c0ca0553c2ffcc7bae5fb1_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
2e90d00a56c0ca0553c2ffcc7bae5fb1_JaffaCakes118
-
Size
29KB
-
MD5
2e90d00a56c0ca0553c2ffcc7bae5fb1
-
SHA1
60beb548690a98e719fa71998d26444407cf919c
-
SHA256
5d587fe6d7d50aee79d489fb99eb45b9fbce3f751ef2a4f8ca03cc033e21a78b
-
SHA512
480dfe4123bbf4942f2e3c9222c6f9cf0f53db1dbbb221b1ae24ea7c70a94c8b5ec6f0d726223ec090f7bbab6f8a41e0c012a33532b89a4bbf147817b8019738
-
SSDEEP
768:UCrpC9k49N4okmAQ1NZ+Mh61G+fWwGdi47sO/8y2LMydk:UJ249cmPr4MSfwdxsO/8F8
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource 2e90d00a56c0ca0553c2ffcc7bae5fb1_JaffaCakes118 unpack001/out.upx
Files
-
2e90d00a56c0ca0553c2ffcc7bae5fb1_JaffaCakes118.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 40KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 27KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.bss Size: - Virtual size: 40B
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 49KB - Virtual size: 49KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ