Behavioral task
behavioral1
Sample
e09eef4414c0e517ebff964c9fc608d1_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
e09eef4414c0e517ebff964c9fc608d1_JaffaCakes118
-
Size
200KB
-
MD5
e09eef4414c0e517ebff964c9fc608d1
-
SHA1
e0281c723c10791e913c35a79ab189d721661f1a
-
SHA256
09df49ebfe1969f668055e7b1b0af338d56c01c65f34a78301c9ae0143079a5f
-
SHA512
06416582caf956f6cf2eb8977e4f780f8a893bebbd07f40907b9839c5e629e9b9f7378ef4f6f9c74ea22be30d7b65140f9de72fa90fa20d04220f0cb3f73d94e
-
SSDEEP
3072:dHYootXWczoDAlEi8mhNitg4gBabvBPwIkAJP1:d4ootXCAlAJP
Malware Config
Signatures
-
Detected Nirsoft tools 1 IoCs
Free utilities often used by attackers which can steal passwords, product keys, etc.
resource yara_rule static1/unpack001/out.upx Nirsoft -
resource yara_rule sample upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource e09eef4414c0e517ebff964c9fc608d1_JaffaCakes118 unpack001/out.upx
Files
-
e09eef4414c0e517ebff964c9fc608d1_JaffaCakes118.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 76KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 58KB - Virtual size: 60KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 74KB - Virtual size: 73KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 22KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ