Behavioral task
behavioral1
Sample
2ffaba312d37fbff6b38f2e8400638f7_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2ffaba312d37fbff6b38f2e8400638f7_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
2ffaba312d37fbff6b38f2e8400638f7_JaffaCakes118
-
Size
80KB
-
MD5
2ffaba312d37fbff6b38f2e8400638f7
-
SHA1
7a9a80e825a54a0a6185e557ba3f00d1fb8f5c47
-
SHA256
7954b8965bee70f6cc3260beb3529d600012c65dbe386e8aeb2af8f856331c43
-
SHA512
6e44267e74c262fcfd1ea40fc039cf9fe7873e1350ebc586cd333e6631adf896608cedd3c4485d7e17187061cd7a8f2719481d93e79f7705b8f4a9f85ccacbfb
-
SSDEEP
1536:cuOT427RiBKKFjUMODrTaymQjWGhSK3veFWLTdtQW21Cc3rOkBLieuung8:cuOTtwKejUMwrTaTMzUK/rLTfQ/15jUN
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource 2ffaba312d37fbff6b38f2e8400638f7_JaffaCakes118 unpack001/out.upx
Files
-
2ffaba312d37fbff6b38f2e8400638f7_JaffaCakes118.exe windows:1 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 76KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 79KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:1 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 97B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 115KB - Virtual size: 114KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE