Behavioral task
behavioral1
Sample
3753255e140283a3239672b2c912145a_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
3753255e140283a3239672b2c912145a_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3753255e140283a3239672b2c912145a_JaffaCakes118
-
Size
101KB
-
MD5
3753255e140283a3239672b2c912145a
-
SHA1
a273db634eb2dd14bb049e08845d6eba67408ab0
-
SHA256
7952eafaa19565d77ca8d2d8afb79c56899ef65270d67ea229f7c598f5c65762
-
SHA512
01cef7f177528ea2c83298a069e24f92e2909114a40cc4728de766fa99812f4fe0a3b3a65e70615b95124cbf0e91d56a88458bd55f6c229384fca529138c11ef
-
SSDEEP
1536:IwFwS+2noQQes9W5pTaLLpLT0ecwaE0Z7EA/PFmy38BGQLi7rO0/8kH5:fSS+2eesMkLLZT0jdd7EA/98BRmB/dH
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource 3753255e140283a3239672b2c912145a_JaffaCakes118 unpack001/out.upx
Files
-
3753255e140283a3239672b2c912145a_JaffaCakes118.exe windows:5 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 52KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 74KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 26KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:5 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 68KB - Virtual size: 68KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 26KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ