Behavioral task
behavioral1
Sample
965c0ac618944d25aa1d8464b933e3f9_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
965c0ac618944d25aa1d8464b933e3f9_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
965c0ac618944d25aa1d8464b933e3f9_JaffaCakes118
-
Size
100KB
-
MD5
965c0ac618944d25aa1d8464b933e3f9
-
SHA1
f6b8e39e8216c4a1e4d2be7806091e00cbfe6d55
-
SHA256
daac11b28622ed31fefb8ed88a0b36da2c907444591b5d50a6d394b40613e535
-
SHA512
e2d385af37ef28d75648b18bfee30a666a9f10a7c7e4482e246ec3b24577a5d8a26e65ab02cf777b9b11391895b48076142b63cd58c6b2892f00ed4353fbe82f
-
SSDEEP
1536:9zQP3rRHbieytZUp07B/SO8i1i2TT4aOGWwgqzycp9qjS11T71z6FNwYRXuWYpvX:9Mbvs9n15EaO6z9qjsQFeYRXO
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource 965c0ac618944d25aa1d8464b933e3f9_JaffaCakes118 unpack001/out.upx
Files
-
965c0ac618944d25aa1d8464b933e3f9_JaffaCakes118.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 404KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 59KB - Virtual size: 60KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 40KB - Virtual size: 108KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 372KB - Virtual size: 368KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 40KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ