Behavioral task
behavioral1
Sample
643eb220ed8b518036cd52a85ec79527_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
643eb220ed8b518036cd52a85ec79527_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
643eb220ed8b518036cd52a85ec79527_JaffaCakes118
-
Size
125KB
-
MD5
643eb220ed8b518036cd52a85ec79527
-
SHA1
930811b4fa5ddd21fe32f50187ca69c26ef76173
-
SHA256
b37bd8ddc30c1871ec764f0113df1cf09b0d2107399b6e0326cfadd54f010d42
-
SHA512
21df716f077c03281bb325df3b2c5ffb10a1c9183a461111709ae3787a104990060d7427da7d514045d7ea31fa5f150f172d88238c0ceb0b7795e93e0a162e18
-
SSDEEP
3072:VAdulyab5VugUkP/ySB8D7jDmo8YRgCOov5b4KSFA70J/tS3mGsW9P:KulyaL1JP/yBvHmo8YSCThbZ70JV0NsW
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource 643eb220ed8b518036cd52a85ec79527_JaffaCakes118 unpack001/out.upx
Files
-
643eb220ed8b518036cd52a85ec79527_JaffaCakes118.exe windows:5 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 168KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 123KB - Virtual size: 124KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:5 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 116KB - Virtual size: 116KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 161KB - Virtual size: 162KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE