Behavioral task
behavioral1
Sample
d0c5ae7a4dbb9a1d14dca32001d84e44_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
d0c5ae7a4dbb9a1d14dca32001d84e44_JaffaCakes118
-
Size
1.2MB
-
MD5
d0c5ae7a4dbb9a1d14dca32001d84e44
-
SHA1
3f754147902fbd81ed1ecc05a77383bb6a6e3036
-
SHA256
95aeb8e74a730265a44cda7426336cd726082dabedacbdf003c0d71a37b3ef3f
-
SHA512
80bbd52660d3f8d6f8f48ac22d7a4861ee273b98536ec2db8b152b1c9c733442e20cf6f68d05f91aa73e3346e9e33750b42129b07ce2106f1fd0a5ffd3982779
-
SSDEEP
24576:mS6EJi9sWtMobfkbVYYmXMP33FD6LbMTYXbLspTTus5QvawUrEd9eWllQosy:mS6YctM9VYYmXo3VD6LYUXbgpTTB5Qvn
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource d0c5ae7a4dbb9a1d14dca32001d84e44_JaffaCakes118 unpack001/out.upx
Files
-
d0c5ae7a4dbb9a1d14dca32001d84e44_JaffaCakes118.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 212KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 1.2MB - Virtual size: 1.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
Size: 228KB - Virtual size: 228KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 136KB - Virtual size: 132KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
vv2 Size: 1.0MB - Virtual size: 1.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE