Behavioral task
behavioral1
Sample
b67fcd0a0ca2e68a3e21d4abf6b04ec3_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
b67fcd0a0ca2e68a3e21d4abf6b04ec3_JaffaCakes118
-
Size
354KB
-
MD5
b67fcd0a0ca2e68a3e21d4abf6b04ec3
-
SHA1
c2050436b79093f0d8c4e1db5aa165f38bd0f1b7
-
SHA256
86b9a92e20c242524a5e31d9758232fd1d33fa5b6c7d1be92d819b40b13f275e
-
SHA512
f2e1f88869cdd828d70b1bd7f494aff66a6003187cda85eb57d167440ec33a5c11f32debb63513aba8712190a74fbeb5cb6060c7eb037597f781ebfc768c574c
-
SSDEEP
6144:G6/5+b1ssrh/l5PYIj7aspV7A01dgth/n5/TwTmSGE7ecUCE1091CDVZouIp64W3:z/TgYIj2sn3n0zTUTUf091CZZouIp6z3
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource b67fcd0a0ca2e68a3e21d4abf6b04ec3_JaffaCakes118 unpack001/out.upx
Files
-
b67fcd0a0ca2e68a3e21d4abf6b04ec3_JaffaCakes118.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 836KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 345KB - Virtual size: 348KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 480KB - Virtual size: 477KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 56KB - Virtual size: 54KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 324KB - Virtual size: 331KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 300KB - Virtual size: 299KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ