Behavioral task
behavioral1
Sample
b598b9c43507fbb56bae1ef73e8e80a1_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b598b9c43507fbb56bae1ef73e8e80a1_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b598b9c43507fbb56bae1ef73e8e80a1_JaffaCakes118
-
Size
353KB
-
MD5
b598b9c43507fbb56bae1ef73e8e80a1
-
SHA1
f9a98fbe91d08294f3b3dddfdd605d52ccfb694a
-
SHA256
74ac691a8add927ef542b2cd9f49807bc4dcc2183ae81b181734bae1e3d743f7
-
SHA512
175925f50af1eedfae16727208cdd410f468e6667694f8fa902d9071d0aa2cff7ad905735032f2c9d1d9e9d099025d008e9999606f7b77d52705ebdf15236a96
-
SSDEEP
6144:hwCh7m45tznNHjlYaFch7L4XWkVw3vxVVjoYcDcF3UApdalgU8X3dEhC2epBa7B:hwChS4HznNHak1XBQbNoYbF3UurXtEhT
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource b598b9c43507fbb56bae1ef73e8e80a1_JaffaCakes118 unpack001/out.upx
Files
-
b598b9c43507fbb56bae1ef73e8e80a1_JaffaCakes118.exe windows:5 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 48KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 352KB - Virtual size: 352KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:5 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 38KB - Virtual size: 38KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 323KB - Virtual size: 326KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE