Behavioral task
behavioral1
Sample
3f43de8142525348556ba21647fde5ef_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
3f43de8142525348556ba21647fde5ef_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
3f43de8142525348556ba21647fde5ef_JaffaCakes118
-
Size
612KB
-
MD5
3f43de8142525348556ba21647fde5ef
-
SHA1
de8d9b61ccf288a12b7b8d8a03376949d5449b42
-
SHA256
fa5e3e785a984e3cc5f09ff4fa5df5932107f9b477c23cfb6c148f58efc16b2f
-
SHA512
c74ddc0ef580c3938964e2ffdb3b9aee67cf08198a58d173cf7211b7f6dc6117fdf0d7ef72e56a819a9ee276db2c1e9bb895fb6c5ab14d13c9481f0a0dabc12b
-
SSDEEP
12288:cgXc0gZRFEs1TFWBBVO3KTePap/eEmtCHxCJCGbGJ5O/1QbGVEpF0+2fiZB4kS:cgqQMTFMBQlPntCHxCkxn0EpFF29kS
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource 3f43de8142525348556ba21647fde5ef_JaffaCakes118 unpack001/out.upx
Files
-
3f43de8142525348556ba21647fde5ef_JaffaCakes118.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 80KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 610KB - Virtual size: 612KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 128KB - Virtual size: 125KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 504KB - Virtual size: 502KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ