Behavioral task
behavioral1
Sample
c065aec37c12134087309388fcfc434e_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
c065aec37c12134087309388fcfc434e_JaffaCakes118
-
Size
769KB
-
MD5
c065aec37c12134087309388fcfc434e
-
SHA1
ef55fd22fa49b715bbb75b93a5910e9b29b73da2
-
SHA256
b03b8dba82101f4857990f80c473326a15c21c38f6954bdb539db78eaca53b0c
-
SHA512
2e25cfcc1c6aed4d5be29dab6f593043f0f7c7d5df8054007d0693774d460fa599f189ce74cb495450cac0d5963a209831d16fd03334db4018d2e3ce5c9950cd
-
SSDEEP
6144:3pqoa8aLiC/2OLSAN7gNVpNleQUohBfGPOtQciXeL/XYqGlebojSP2pjNhcQoTFr:3pqiC/2OGAtkCP4cejGSOpRKDUGiO
Malware Config
Signatures
-
resource yara_rule sample upx -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule sample autoit_exe -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c065aec37c12134087309388fcfc434e_JaffaCakes118
Files
-
c065aec37c12134087309388fcfc434e_JaffaCakes118.exe windows:5 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: 420KB - Virtual size: 420KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 256KB - Virtual size: 256KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.BUPX1 Size: 72KB - Virtual size: 72KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE