Behavioral task
behavioral1
Sample
398c2070d045a40f63871f972f1bd490_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
398c2070d045a40f63871f972f1bd490_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
398c2070d045a40f63871f972f1bd490_JaffaCakes118
-
Size
104KB
-
MD5
398c2070d045a40f63871f972f1bd490
-
SHA1
8a09541d905b2b92408f3fea73eeb8c6659e3a32
-
SHA256
3962ed790e73fab8c36b5331a54c16db4dc207268c91c3aeee6fd293809a3409
-
SHA512
c894949f3a4b8c8a4d4dd40a000b46b466a60aa40f407be182283e09ff03e45081169ec43d1893266cfc5a6be78650c7a17e35ce677025064a156d816b11b21e
-
SSDEEP
1536:FH3Q39hERClu/T2TGn2YL4W3qLrgwQQn6POJnkotFMCEsuubpPLOSZGd2b/PU6:F63dwr23TWaLrgwFn5JXt+CEDqz5bU6
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource 398c2070d045a40f63871f972f1bd490_JaffaCakes118 unpack001/out.upx
Files
-
398c2070d045a40f63871f972f1bd490_JaffaCakes118.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 304KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 99KB - Virtual size: 100KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 380KB - Virtual size: 379KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ