Behavioral task
behavioral1
Sample
a99df607811d685be5db8d168b7654ef_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
a99df607811d685be5db8d168b7654ef_JaffaCakes118
-
Size
120KB
-
MD5
a99df607811d685be5db8d168b7654ef
-
SHA1
78cace91d33c3562b201381df7fc5ccf21f881a1
-
SHA256
f8a91483984ad962e329555d87f2ce65aaa96010f4b847c3b1f5286dcca156af
-
SHA512
5bace4775c3ed753626b187422d197f6db7d02a965bfaa2ff87bb69570badc66b2606af8e1f5ee456d8c455988aeffe72b6b8414e79b7f1db2855018daee537d
-
SSDEEP
3072:yNQDuonGxX4ikbwTfncip/Gdcxhanux3cny583ae3B0Kh:yqDtmFpciFxN5+pqKh
Malware Config
Signatures
-
Detected Nirsoft tools 1 IoCs
Free utilities often used by attackers which can steal passwords, product keys, etc.
resource yara_rule static1/unpack001/out.upx Nirsoft -
resource yara_rule sample upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource a99df607811d685be5db8d168b7654ef_JaffaCakes118 unpack001/out.upx
Files
-
a99df607811d685be5db8d168b7654ef_JaffaCakes118.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 76KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 56KB - Virtual size: 60KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 63KB - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 71KB - Virtual size: 71KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 22KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ