Behavioral task
behavioral1
Sample
CABALR~3.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
CABALR~3.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
is160806.exe
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
is160806.exe
Resource
win10v2004-20241007-en
General
-
Target
3e17eb1dc731cb28c5a82f8893b11562_JaffaCakes118
-
Size
1.5MB
-
MD5
3e17eb1dc731cb28c5a82f8893b11562
-
SHA1
e0d6db645fa72c1664c6891ad405d1e78da1af07
-
SHA256
f10f70027b2571ed12d4ff69e407e0681af725bcfed77b3018eb6535e4271801
-
SHA512
c6a9633680d7e7edd585a5abe75f4637a32b1b0ad86e004520357f29fe7fa9db210cb291617fb6163db46275c3a7a1ee87ac3d748814d111c669ed2cc9ea0f88
-
SSDEEP
24576:8Y1sfE+lNsZjyfhAKOZGOjcN+z+jDEPlUL9URotKdmy7U0RUQRfEN:Pefh3sZuJZ4Bw0aXSyjtWUjQa
Malware Config
Signatures
-
resource yara_rule static1/unpack001/CABALR~3.EXE upx -
Unsigned PE 3 IoCs
Checks for missing Authenticode signature.
resource unpack001/CABALR~3.EXE unpack002/out.upx unpack001/is160806.exe
Files
-
3e17eb1dc731cb28c5a82f8893b11562_JaffaCakes118.cab
-
CABALR~3.EXE.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 88KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 44KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 7KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 73KB - Virtual size: 76KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
is160806.exe.exe windows:4 windows x86 arch:x86
48f16a5932b5ef693e9b1dd849029fd7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
SetCursor
OffsetRect
DialogBoxParamA
CreatePopupMenu
CreateMDIWindowA
CreateDialogParamA
kernel32
ExitProcess
lstrcatA
SetCurrentDirectoryA
MapViewOfFile
GetVersion
GetSystemTimeAsFileTime
GetStartupInfoA
EnumResourceTypesA
GetDateFormatA
Sections
.text Size: 27KB - Virtual size: 27KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 26KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE