Behavioral task
behavioral1
Sample
abbf13e1f2b868e3439479ca7e7a5cc7_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
abbf13e1f2b868e3439479ca7e7a5cc7_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
abbf13e1f2b868e3439479ca7e7a5cc7_JaffaCakes118
-
Size
143KB
-
MD5
abbf13e1f2b868e3439479ca7e7a5cc7
-
SHA1
52e2f8c0f61f2b2a26784ebf407c1c5680d0f50b
-
SHA256
ab64aec882d204ba6359ab6b3906e9b089cf36d36095a70fe488edc638b2cf1f
-
SHA512
e5000b7321035ee8718d4ccb9fa87d7cb9a1e3f451928bb6d3b28f9f76eb903173ac97e181bc60aea89e3bf88643e845ac813fa96dfc6f311a61bcfb57b8c337
-
SSDEEP
3072:qAxPVBcJj5dTEpyP65+2WojHSoqA7geAhbi4FjOC:qAP2JjIpPpOJl
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource abbf13e1f2b868e3439479ca7e7a5cc7_JaffaCakes118 unpack001/out.upx
Files
-
abbf13e1f2b868e3439479ca7e7a5cc7_JaffaCakes118.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 160KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 53KB - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 89KB - Virtual size: 92KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 84KB - Virtual size: 80KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 92KB - Virtual size: 91KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ