Behavioral task
behavioral1
Sample
842b4d5144e16bd02aa3260c441f21cf_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
842b4d5144e16bd02aa3260c441f21cf_JaffaCakes118
-
Size
101KB
-
MD5
842b4d5144e16bd02aa3260c441f21cf
-
SHA1
f139186498e7b9393b564399e850c08b0c0b994f
-
SHA256
d49ad5c732ba97e8118b4971bcccad855bed1a967ff509b9bb514a804c72ab9f
-
SHA512
cea6a48024805e73194837599b93a196709076488415cee7c105d23bd91022ae4ed3581bc92fe6ba5e23c73df20804c47a8c259556634b8af9b854ec9ed05b3b
-
SSDEEP
1536:3/flw41o9c73fT1SN5pIe0tMLY/QxxCinzSQjeuHk2YTVNbFfOZL1YN:3/fGUo9c7xSWeDYoxIimxuH5YTTbFa+N
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 842b4d5144e16bd02aa3260c441f21cf_JaffaCakes118
Files
-
842b4d5144e16bd02aa3260c441f21cf_JaffaCakes118.exe windows:4 windows x86 arch:x86
7a7803027531302026dedc7b5f6025f2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcAddress
Sections
UPX0 Size: - Virtual size: 464KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 89KB - Virtual size: 92KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.nwc Size: 512B - Virtual size: 512B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.nwcx Size: 512B - Virtual size: 512B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE