Behavioral task
behavioral1
Sample
766a0c1d0844be942c33c31d31ebce98_JaffaCakes118.exe
Resource
win7-20240705-en
General
-
Target
766a0c1d0844be942c33c31d31ebce98_JaffaCakes118
-
Size
119KB
-
MD5
766a0c1d0844be942c33c31d31ebce98
-
SHA1
16994cb7d6f280163f97822c28d7ad031be5325b
-
SHA256
e236ec2054825f2bc46c6095e5f8cbdb6a60471c3715e5a10f174c588662dde3
-
SHA512
bd0880cdf44e0c99fb0d7f1f6a7d2e7d0afa9cb374c641c15f98ac7adcca5ad6a48acc15bae4c085cce423c1f5da5a2d8b2e71749265dd725117d88c673c3a00
-
SSDEEP
3072:D3Oom2TCKUBJ2TZ/mwJny/83lJq8rzjJvyn/3I:D3OjQMcTD+EK8bJo/
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource 766a0c1d0844be942c33c31d31ebce98_JaffaCakes118 unpack001/out.upx
Files
-
766a0c1d0844be942c33c31d31ebce98_JaffaCakes118.exe windows:4 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_ISOLATION
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 356KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 116KB - Virtual size: 116KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:4 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_ISOLATION
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 112KB - Virtual size: 108KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 456B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 256KB - Virtual size: 255KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 92KB - Virtual size: 88KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ