Behavioral task
behavioral1
Sample
773797bcdd4f4639ace687a7f0ba0e59_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
773797bcdd4f4639ace687a7f0ba0e59_JaffaCakes118.exe
Resource
win10v2004-20240729-en
General
-
Target
773797bcdd4f4639ace687a7f0ba0e59_JaffaCakes118
-
Size
20KB
-
MD5
773797bcdd4f4639ace687a7f0ba0e59
-
SHA1
57e58c0eb5b7bf5d00993d05e28f54e0f1fc33e3
-
SHA256
98220db987f783007ac1804967a01b974fa1a61c34c1b9dc0ce470e815f1dbbe
-
SHA512
cd365e397190db895f7ad60c59f0831cb96e80ddb81b120feeb13f491841af8e036d233ce511b5ea75acb11d62e28436b84e082db262ed4a42a792e530230d0c
-
SSDEEP
384:Gb1x+6vI/W5Ht8xosaz5/EVkNYc/u4po1gAin952AWEF0FlgilkjdA+GuJF6iD:81rAT9av1ijqNiIm+J36
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource 773797bcdd4f4639ace687a7f0ba0e59_JaffaCakes118 unpack001/out.upx
Files
-
773797bcdd4f4639ace687a7f0ba0e59_JaffaCakes118.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 212KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 19KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
Size: 27KB - Virtual size: 27KB
IMAGE_SCN_MEM_WRITE
Size: 3KB - Virtual size: 2KB
IMAGE_SCN_MEM_WRITE
Size: 5KB - Virtual size: 181KB
IMAGE_SCN_MEM_WRITE
Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_WRITE
Size: 257B - Virtual size: 257B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE