Behavioral task
behavioral1
Sample
a45bf69e9b6aa455d8de3ec384bd6916_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
a45bf69e9b6aa455d8de3ec384bd6916_JaffaCakes118
-
Size
118KB
-
MD5
a45bf69e9b6aa455d8de3ec384bd6916
-
SHA1
28e2db6e4f13297e99db0373b975017705286bca
-
SHA256
7ca7e570b248f304417ef62ab9d7a98589bb9d5f409a533b303408ac3fe903ba
-
SHA512
2f857a43d87398248c430f7a3ce6504698d28804aa9040221d05dcb07d1ac337bfbcddd7ddda38ee97e1a7e5203bf5a567f3331c6071fda578081e9e5143e0ac
-
SSDEEP
3072:NqqENIlgDPyWuzZRDEr1Lp97I/w3fqVH0zc172b:NJgTbu7QZLzk8fqVUzc16
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource a45bf69e9b6aa455d8de3ec384bd6916_JaffaCakes118 unpack001/out.upx
Files
-
a45bf69e9b6aa455d8de3ec384bd6916_JaffaCakes118.exe windows:5 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 256KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 111KB - Virtual size: 112KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:5 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 166KB - Virtual size: 166KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 74KB - Virtual size: 73KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 101KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ