Behavioral task
behavioral1
Sample
b37c92882539cce17ae7dd1ffdd8e995_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b37c92882539cce17ae7dd1ffdd8e995_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b37c92882539cce17ae7dd1ffdd8e995_JaffaCakes118
-
Size
71KB
-
MD5
b37c92882539cce17ae7dd1ffdd8e995
-
SHA1
b706eb92e566624076a7b19756e475a549af7da9
-
SHA256
48ba6411c8ba928c5a0d4e1fe95817c9ddf973f3388ac9dc62545768e88e6101
-
SHA512
b393b43e44dec075f9506bb31ff7a6601bb6dba9b13a00ef165cf3a756645dabab5b02645271bec105d029a21f34e748bbe9079d256b67e2b2b93d39d8fe59e2
-
SSDEEP
1536:JjbgKi1b+1L2Z9izryieRtZUiEDh2oxAPbE9t:Vbgh1SgZ4DeRW2oeu
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource b37c92882539cce17ae7dd1ffdd8e995_JaffaCakes118 unpack001/out.upx
Files
-
b37c92882539cce17ae7dd1ffdd8e995_JaffaCakes118.exe windows:4 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
Ygpe Size: - Virtual size: 40KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Ygpe Size: 70KB - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:4 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 68KB - Virtual size: 67KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE