Behavioral task
behavioral1
Sample
405bad048f63e855b63912047b1c5ec5_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
405bad048f63e855b63912047b1c5ec5_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
405bad048f63e855b63912047b1c5ec5_JaffaCakes118
-
Size
90KB
-
MD5
405bad048f63e855b63912047b1c5ec5
-
SHA1
8f72a816ef8d2a07ee03ceab90236d5a5c012322
-
SHA256
768f6f830a1920bc110dc885cf2c710395f7863d9bb4fd2f7ce6d1600876a59c
-
SHA512
83cb39356fe93ae63517fcf43b8fe1325894dbf9dc01276dd85cf4bd0b4b46fd1ed31ad6597350d07c3fa1c07db0b59a4c2a05ff3898301129b6285a7c8a56f1
-
SSDEEP
1536:gCDhf+Gbo3cCMP/d4JgOI1UZMTC44gdARDofj4Cyc03sT9UU04HdV:gOhf+Gbo3I14JWUZMTC4FdARuj/6cT9d
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource 405bad048f63e855b63912047b1c5ec5_JaffaCakes118 unpack001/out.upx
Files
-
405bad048f63e855b63912047b1c5ec5_JaffaCakes118.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 168KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 88KB - Virtual size: 92KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 172KB - Virtual size: 171KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 40KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE