Behavioral task
behavioral1
Sample
12455e762a96ad5e0957df22634af8ec_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
12455e762a96ad5e0957df22634af8ec_JaffaCakes118
-
Size
185KB
-
MD5
12455e762a96ad5e0957df22634af8ec
-
SHA1
44d867e76d1d99509e4514c1965109931030cccc
-
SHA256
9879c2ed5ae61337ed3759fc1682ef1a20e0181d1443fae6600e2e207d92ea9d
-
SHA512
3a8d934f0542e683e9dc7a515e957b832cebb10e6d9a0fca851d15b0e376aabeeae8a714c7f4c0c1e54f756b004341e356c703a4988332fa1fcf3904f79898ea
-
SSDEEP
3072:uG53Gw7+tD+lgLHs6AzPNdPNlrejdfxyckoqCmN/l5wUgnKUD809BcW7Vif2:u03GkiKlgLHs64dlrOdscKJ5wUgK088J
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource 12455e762a96ad5e0957df22634af8ec_JaffaCakes118 unpack001/out.upx
Files
-
12455e762a96ad5e0957df22634af8ec_JaffaCakes118.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
UPX0 Size: - Virtual size: 3.3MB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 177KB - Virtual size: 180KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 7KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
.text Size: 44KB - Virtual size: 48KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 14KB - Virtual size: 16KB
IMAGE_SCN_MEM_READ
.data Size: 3.0MB - Virtual size: 3.2MB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 185KB - Virtual size: 184KB
IMAGE_SCN_MEM_READ