Behavioral task
behavioral1
Sample
2ff0849604ff2055fdf6e12d20d9336f_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2ff0849604ff2055fdf6e12d20d9336f_JaffaCakes118.exe
Resource
win10v2004-20240708-en
General
-
Target
2ff0849604ff2055fdf6e12d20d9336f_JaffaCakes118
-
Size
393KB
-
MD5
2ff0849604ff2055fdf6e12d20d9336f
-
SHA1
2f4a14b8e65cd7d043b09685a64b94ca7a8c7e73
-
SHA256
002222026dab338df8708d6acd59bd871ab684edeec6bf028e16db28a734725f
-
SHA512
a4d148078196d9c9e91fafa330fe7a481734f7ade34a41b18ee16149b8424c483d166cdfb59de6edf798e5597c46b11b52443ca92051448ca50df8eb3fc73ba4
-
SSDEEP
6144:4PYAruDjiwF06bK3QEqOj6YcgeVDJDldSVCXnbcvbL3CT3C1zPoKKDCb:4PYAidF1Uhq+6cGDJhdSVC3YLSG1bKC
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2ff0849604ff2055fdf6e12d20d9336f_JaffaCakes118
Files
-
2ff0849604ff2055fdf6e12d20d9336f_JaffaCakes118.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
UPX0 Size: - Virtual size: 520KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: - Virtual size: 288KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.Jiaozhu Size: - Virtual size: 328KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.Jiaozhu Size: - Virtual size: 360KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.Jiaozhu Size: 392KB - Virtual size: 396KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE