Behavioral task
behavioral1
Sample
c1f11fe0e5937f41a4c74747640a20fa_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c1f11fe0e5937f41a4c74747640a20fa_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
c1f11fe0e5937f41a4c74747640a20fa_JaffaCakes118
-
Size
24KB
-
MD5
c1f11fe0e5937f41a4c74747640a20fa
-
SHA1
bc990dd8b1cf0c380701c723736c815ec341ef5f
-
SHA256
2937c88f07d29655d66376bf48a2b3c48d17ce3e30bb6d5952c4361e83515fc6
-
SHA512
fce07b5caad734b2379c56621113c4cbd5f3144b57bd4f6d0ad9392569656d14981915d16f456a47244fd980c7caf3288c5de4471d60fa389d8c6280677ef871
-
SSDEEP
384:ypTSkNek4MaVc/qzh4mPFPg96D2v53+I3T5lS9R7NprQJMHhzY:qbLzaVl5Plgd53+ulS9tNprQJMHhz
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource c1f11fe0e5937f41a4c74747640a20fa_JaffaCakes118 unpack001/out.upx
Files
-
c1f11fe0e5937f41a4c74747640a20fa_JaffaCakes118.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 148KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 22KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 31KB - Virtual size: 31KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 120KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE