Behavioral task
behavioral1
Sample
30c2f36d7f2aa609fa49638218bf92ed_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
30c2f36d7f2aa609fa49638218bf92ed_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
30c2f36d7f2aa609fa49638218bf92ed_JaffaCakes118
-
Size
391KB
-
MD5
30c2f36d7f2aa609fa49638218bf92ed
-
SHA1
18d161ee8a9ad181a21e4bf6dec33d5fbe32f7de
-
SHA256
cb6df9a908c830b7564604cd3947303e427d7cd4e300bd56b213e4ad43e3f1eb
-
SHA512
d7963e95f27623901049e5bd391590b2e000dafc25246034cb91312dd0505bad0201a55c9c49676f28c24de76223bd28bd89cdd368e67091166176b4e2af58ff
-
SSDEEP
6144:C9dEoET3GnWHz31X4k1+bPKfq5g13wuNJln2snV4ZfkGIxaQneX+S4y:Cf2GWT31oC1qm13wuRn2sV4RQcQeuS9
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource 30c2f36d7f2aa609fa49638218bf92ed_JaffaCakes118 unpack001/out.upx
Files
-
30c2f36d7f2aa609fa49638218bf92ed_JaffaCakes118.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 1.1MB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 368KB - Virtual size: 368KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 22KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 1.4MB - Virtual size: 1.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ