Behavioral task
behavioral1
Sample
5c043cae60dad9787a62d8bb361c19a4_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
5c043cae60dad9787a62d8bb361c19a4_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
5c043cae60dad9787a62d8bb361c19a4_JaffaCakes118
-
Size
169KB
-
MD5
5c043cae60dad9787a62d8bb361c19a4
-
SHA1
b7de173f789e6c3b96328c9f39695c2f42bd2a23
-
SHA256
a15a5741d95578a2376dbd21ce0938b793a1321d4508ff871f2725eb8b051c15
-
SHA512
e715833b3824e5efcdd3f9f5c3320b7849cb30b8df72d8e722a4f8d2654d33e8b25c841fc60fa22adcd195399323553a868dea9c7283cf5b72231e63f60a7b68
-
SSDEEP
3072:ZvMw/tt1cSgVbBPrM1LUk+T8NiwyD0E0KEg5EEW/FChN22VzyJmElenVVqBOTQj:Zvj/Gnw1p+Ci7UgWEWtCX22VmJmtV1TQ
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource 5c043cae60dad9787a62d8bb361c19a4_JaffaCakes118 unpack001/out.upx
Files
-
5c043cae60dad9787a62d8bb361c19a4_JaffaCakes118.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 52KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 165KB - Virtual size: 168KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 200KB - Virtual size: 196KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ