Behavioral task
behavioral1
Sample
b074114d69ea0379cd59eb94ed7400f5_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
b074114d69ea0379cd59eb94ed7400f5_JaffaCakes118
-
Size
88KB
-
MD5
b074114d69ea0379cd59eb94ed7400f5
-
SHA1
d909c5439c0e8ea33f657e6c3fc3812b0ce8b99e
-
SHA256
c9295b7bcac6af6c5a74574a70880ace4f44759ab56e997296dff60bbed2f418
-
SHA512
ddfa71e67e3cfcd78a361d39e017863c9b22cf0975f3c8290fc2cdd29cf0853cd6f9f90f8b8d0205211e6219c8318e6f144cb4a03c74ce11967d76079593c083
-
SSDEEP
384:5RT+1gE9MUEdG3bYmyC1MgyRHs5VWA8Y9fOkbLuVh03:3TGz9MLdGLxyC2gPnW3Y9fOkbLu/0
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource b074114d69ea0379cd59eb94ed7400f5_JaffaCakes118 unpack001/out.upx
Files
-
b074114d69ea0379cd59eb94ed7400f5_JaffaCakes118.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 28KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 11KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 76KB - Virtual size: 104KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1024B - Virtual size: 724B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE