Behavioral task
behavioral1
Sample
4914c885cfa64f662e516faa1b887016_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
4914c885cfa64f662e516faa1b887016_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
4914c885cfa64f662e516faa1b887016_JaffaCakes118
-
Size
8KB
-
MD5
4914c885cfa64f662e516faa1b887016
-
SHA1
cfa1c27cc28d69e4a31b462e778319843a400adc
-
SHA256
4602ff0c13511739e73f666f2b051d6ecbfcfff8b9c19004bb96efd5333b9985
-
SHA512
522e1539269dc3c18d8991fd02b1e9c2c8c3cae223f24ddf27e62a5717623f28e28e443c74c7f8899ace0cffc52807f547de11d3d22153caed013807c320807f
-
SSDEEP
192:jgLrmRN1I7deYLSxX3DUfBTlfBJzZdmouZ+WuKWaG:MLrmR07deYGxXzUZT13NucWuKWaG
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource 4914c885cfa64f662e516faa1b887016_JaffaCakes118 unpack001/out.upx
Files
-
4914c885cfa64f662e516faa1b887016_JaffaCakes118.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 24KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 6KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 948B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ