Behavioral task
behavioral1
Sample
b0dff336be2d8d830e9a0b8502f139f8_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
b0dff336be2d8d830e9a0b8502f139f8_JaffaCakes118
-
Size
38KB
-
MD5
b0dff336be2d8d830e9a0b8502f139f8
-
SHA1
0f4436341c75688295846f7c7b7a1aae3504bcca
-
SHA256
85562628b1cf005e543d9e950e4f0db5647fb385a909d3b6e9063c441aa6e9d5
-
SHA512
7b0179fcedb3af00677c4223a9edd48a5cd8a0eb8ac4f31e1183fe4999abcaec4bdcc7d239d1a0228d72e242b83deab0e3da1ea50e7993a1335b4bd118737fa0
-
SSDEEP
768:NNk8Fb2jJpr37qPiAXCs+HTGAB5CY0ZL81F2ts1A2G2oYS7ch0Ys:NKWC9prLqaASP58i0tF2zo1gs
Malware Config
Signatures
-
Detected Nirsoft tools 1 IoCs
Free utilities often used by attackers which can steal passwords, product keys, etc.
resource yara_rule static1/unpack001/out.upx Nirsoft -
resource yara_rule sample upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource b0dff336be2d8d830e9a0b8502f139f8_JaffaCakes118 unpack001/out.upx
Files
-
b0dff336be2d8d830e9a0b8502f139f8_JaffaCakes118.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 48KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 29KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 40KB - Virtual size: 39KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ