Static task
static1
Behavioral task
behavioral1
Sample
Touch_Unlock/Unlock_Touch.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
Touch_Unlock/Unlock_Touch.exe
Resource
win10v2004-20240709-en
General
-
Target
765b43b90f4ae3f269cf13f3ee6fad31_JaffaCakes118
-
Size
224KB
-
MD5
765b43b90f4ae3f269cf13f3ee6fad31
-
SHA1
0223b08903d3b74e06b3ac0e597b79839174b193
-
SHA256
346d5bf4fdbb0407311de47ba00e32216f7a36e36fdad0eab2a2ac8bd3f818f2
-
SHA512
63604a374054eb8b013331d2601bc88092ba3af196932ea9e2bc4e64214a6c49484c9f431d2f5ce025f59ad7eb654fda87338d651ad28d8244af36b995396283
-
SSDEEP
3072:OU0SslRs1XlD9kb3+QljTt7SKR6uouHAIrjBiaLVP+rAVx3KH2NIOE/H12K4ZbF1:O5jEkb3zRSKRl3gI+0nHO5kK4Z4OAM
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/Touch_Unlock/Unlock_Touch.exe
Files
-
765b43b90f4ae3f269cf13f3ee6fad31_JaffaCakes118.zip
-
Touch_Unlock/Unlock_Touch.exe.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
CODE Size: 97KB - Virtual size: 97KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
DATA Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BSS Size: - Virtual size: 10KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: - Virtual size: 12B
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 30KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ