Behavioral task
behavioral1
Sample
3838ec8a935a9b7639099c0d89eaf7cd_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3838ec8a935a9b7639099c0d89eaf7cd_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3838ec8a935a9b7639099c0d89eaf7cd_JaffaCakes118
-
Size
199KB
-
MD5
3838ec8a935a9b7639099c0d89eaf7cd
-
SHA1
5e5ed6c43e7972a51909818a7de873fff3f5fa01
-
SHA256
b9829b2056979890f10a818c35ed4f1ac442cd9fbafff3b46841490b59929f0e
-
SHA512
76cf9e1fa22456796abe3e8a7a39c16efb09857e33b2e2ff299c51d6e47416c28a51e2a8118a96652168793dfec6051af0d5c937af5549b14cd91af2153bf8cf
-
SSDEEP
3072:w+54lwHLxjz/N9Zh/GiJcaJ8uyYg2QjUVOWGfAdDJs5bToeFrwWv9BlTzqHq34:/z/L/GiJhJaFr8UfAN+doETlvvqK34
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource 3838ec8a935a9b7639099c0d89eaf7cd_JaffaCakes118 unpack001/out.upx
Files
-
3838ec8a935a9b7639099c0d89eaf7cd_JaffaCakes118.exe windows:5 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 120KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 190KB - Virtual size: 192KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 7KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:5 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 153KB - Virtual size: 152KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 140KB - Virtual size: 139KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ