Behavioral task
behavioral1
Sample
a1cb7bce641a3b5337118b4d91e2d70f_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
a1cb7bce641a3b5337118b4d91e2d70f_JaffaCakes118
-
Size
23KB
-
MD5
a1cb7bce641a3b5337118b4d91e2d70f
-
SHA1
519cb6170845d0c63b9ff4e6b4d4fe31f9721561
-
SHA256
fdc5532844b832d7e1937d3e4bf8add4a1fa4cb163aa42d0369bb77d927e5b4e
-
SHA512
fd4c2925d82341de8944a244e8323ca187e6c170c4a99ad01a923119ce5e86f85072a9021e6597e6aa660242ec45c0993b5d3e301a3e8111aea698f71ebab5cc
-
SSDEEP
384:u5kEtN86KDQW/feSQ1bNcegN/BSOCh46D226WPZ/tg7dn9Kk5xbCsSktzCBogb5M:utk0UN/BL6NBu7d9diC9D9
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource a1cb7bce641a3b5337118b4d91e2d70f_JaffaCakes118 unpack001/out.upx
Files
-
a1cb7bce641a3b5337118b4d91e2d70f_JaffaCakes118.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 32KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 19KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 19KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 10KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 2KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ