Behavioral task
behavioral1
Sample
743f9c69de31201904062eec2c7e74dd_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
743f9c69de31201904062eec2c7e74dd_JaffaCakes118
-
Size
6KB
-
MD5
743f9c69de31201904062eec2c7e74dd
-
SHA1
d5fe52e4d777054c00ac6daa7fbe8738ecbeaa27
-
SHA256
776872feaf168603302b86e099540a4695e77772b6cc4b3af6c43c2145e366c1
-
SHA512
cef5c439d1837a328cd3a2af946944e13b46bae28109825d7c1c0480117b7291fef886ed15142c024331301d2c891b94aa6148e020e92e8c2337da9e08efe233
-
SSDEEP
96:cStfWfz+qFIPvXQUjfvc2vvUnqxqwX4Uy2jVhEaQUAnvLvVWrFCycXcID:ceWKqFInXFc2UnqEW4Uyo/AnvG4L3D
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource 743f9c69de31201904062eec2c7e74dd_JaffaCakes118 unpack001/out.upx
Files
-
743f9c69de31201904062eec2c7e74dd_JaffaCakes118.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 20KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 5KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.code Size: 1024B - Virtual size: 854B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.flat Size: 512B - Virtual size: 7B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE