Behavioral task
behavioral1
Sample
3090e9f30cc63c72c347000e75148c92_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3090e9f30cc63c72c347000e75148c92_JaffaCakes118.exe
Resource
win10v2004-20240708-en
General
-
Target
3090e9f30cc63c72c347000e75148c92_JaffaCakes118
-
Size
85KB
-
MD5
3090e9f30cc63c72c347000e75148c92
-
SHA1
910425e31ad2e6840b6ec98a036005bafaea29a9
-
SHA256
d2d258bd2a8c5c67c22881f2099e66adcef56184e4af3f21d34061a7dd2c5079
-
SHA512
d6687897a504daaee826928fd7e80fd8bbd8f790e9a6c55d0100c96656b15b5bd8957dbae77e3f1bf8d882ed7c5598b23de916486323b5adb6758ddc198e23d6
-
SSDEEP
1536:IUgQUsW9e8EtXJYxmeYRxQuCgu6K0z4AtsLOtcqNqa450JrLTUBhu+dhYtt1:IUgQ4KexxaxbCJ6XzPFthNq50+Stt1
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource 3090e9f30cc63c72c347000e75148c92_JaffaCakes118 unpack001/out.upx
Files
-
3090e9f30cc63c72c347000e75148c92_JaffaCakes118.exe windows:6 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 124KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 80KB - Virtual size: 84KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 68KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:6 windows
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
Sections
Size: 143KB - Virtual size: 142KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Size: 19KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 15KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ