Behavioral task
behavioral1
Sample
6f1d989d228cc0812e22405c56d03f02_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
6f1d989d228cc0812e22405c56d03f02_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
6f1d989d228cc0812e22405c56d03f02_JaffaCakes118
-
Size
84KB
-
MD5
6f1d989d228cc0812e22405c56d03f02
-
SHA1
64274c396bab046b86330c9423a52e3b41de55df
-
SHA256
40baf27cb46c04fed693a693eb61ccefa584dead8757d42d66ccb42a8d745b86
-
SHA512
06868474e9888a0f4e52d40b2cdb886447eef396bab0820a8fc43b1c0d7b049dea09afa3561975b6daf8498522617156f199aaba42d5c4c81e80612734079fc2
-
SSDEEP
1536:GlBB9rOsU4PmXKh3NDAFQw0Ke0d3Ehlu7TyFSxc1QT8TPiXsvCUhyLR7n:0XlUO57Q0B011qFSxqi0CNLRD
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource 6f1d989d228cc0812e22405c56d03f02_JaffaCakes118 unpack001/out.upx
Files
-
6f1d989d228cc0812e22405c56d03f02_JaffaCakes118.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 424KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 10KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 72KB - Virtual size: 76KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 402KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE