_crt_debugger_hook
Behavioral task
behavioral1
Sample
b587c3f9278d850ff404a284d2bbb9de_JaffaCakes118.exe
Resource
win7-20240729-en
General
-
Target
b587c3f9278d850ff404a284d2bbb9de_JaffaCakes118
-
Size
66KB
-
MD5
b587c3f9278d850ff404a284d2bbb9de
-
SHA1
20318666b90cceaf1029dc186579f487c51faf0e
-
SHA256
b240bf9c2a3e8f27e3a5a03963f33f36ff62324e0fd416d24de301b308b7af9f
-
SHA512
323432c6ed75ecc29e39d97645426a4a7bc58cbf28c4729f7e33ac556266289897a39e0a29d59b4db7badfae40cc5db41aa9d72dcc19a373376cdf18617c5b87
-
SSDEEP
1536:8TyrvAXFAVDMOpde9NhK8+jaELLR9uQmIa6D:8TybAVgDMOpcBK8+RmIN
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource b587c3f9278d850ff404a284d2bbb9de_JaffaCakes118 unpack001/out.upx
Files
-
b587c3f9278d850ff404a284d2bbb9de_JaffaCakes118.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 64KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 64KB - Virtual size: 68KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Exports
Exports
Sections
.text Size: 75KB - Virtual size: 74KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 33KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ