Behavioral task
behavioral1
Sample
WinPcap_2_3.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
WinPcap_2_3.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
arpspoof.exe
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
arpspoof.exe
Resource
win10v2004-20240709-en
General
-
Target
72f1b4eb62b9f80429a6d69ac1e9cc84_JaffaCakes118
-
Size
332KB
-
MD5
72f1b4eb62b9f80429a6d69ac1e9cc84
-
SHA1
2314ffce9f44f1f23e112a7a883ec4974acea56b
-
SHA256
a2c84b91cdbbe168bb5aaa26234896a8337801eca4dfe46c3caf33e237a6e90e
-
SHA512
96b9559a8be74d3a3bf57a30821fb0ea7d61a47c72f5a2d0405afb4ed0019c4b285d905b5c6111b5ec00bc90fa2476691e10f6297dcd21e03a53f56a3431579c
-
SSDEEP
6144:q3tt+17vLJ3JvwlbuEX1X5GeLIKDCuzgieJZV5F5bMPw+3+zvamEQpdaSv6g/C:C+17TJ5vwlXXFGSFeJ3vNM13+bZEQpMB
Malware Config
Signatures
-
resource yara_rule static1/unpack001/WinPcap_2_3.exe upx -
Unsigned PE 3 IoCs
Checks for missing Authenticode signature.
resource unpack001/WinPcap_2_3.exe unpack002/out.upx unpack001/arpspoof.exe
Files
-
72f1b4eb62b9f80429a6d69ac1e9cc84_JaffaCakes118.rar
-
WinPcap_2_3.exe.exe windows:1 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
UPX0 Size: - Virtual size: 176KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 97KB - Virtual size: 100KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 7KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:1 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
CODE Size: 179KB - Virtual size: 178KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
DATA Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BSS Size: - Virtual size: 2KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: - Virtual size: 8B
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 46KB - Virtual size: 46KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
arpspoof.exe.exe windows:4 windows x86 arch:x86
9aed57a1e25e3c7205fea8602f57b814
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WideCharToMultiByte
WaitForSingleObject
CreateThread
GetLastError
Sleep
SetHandleCount
GetStdHandle
GetStringTypeW
GetStringTypeA
SetStdHandle
LCMapStringA
MultiByteToWideChar
LCMapStringW
GetEnvironmentStringsW
LoadLibraryA
GetProcAddress
SetFilePointer
FlushFileBuffers
GetCommandLineA
GetVersion
ExitProcess
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
CloseHandle
GetEnvironmentStrings
HeapReAlloc
HeapFree
RtlUnwind
GetFileType
GetStartupInfoA
HeapDestroy
HeapCreate
VirtualFree
GetOEMCP
WriteFile
HeapAlloc
GetCPInfo
GetACP
VirtualAlloc
packet
PacketAllocatePacket
PacketGetAdapterNames
PacketOpenAdapter
PacketSendPacket
PacketInitPacket
PacketSetNumWrites
ws2_32
WSAStartup
inet_addr
htons
WSACleanup
iphlpapi
SendARP
Sections
.text Size: 20KB - Virtual size: 17KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE