Behavioral task
behavioral1
Sample
JaffaCakes118_6413404ffe12dae183e6a7223b51c1c0.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_6413404ffe12dae183e6a7223b51c1c0.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_6413404ffe12dae183e6a7223b51c1c0
-
Size
25KB
-
MD5
6413404ffe12dae183e6a7223b51c1c0
-
SHA1
f74b9d6d90e7dbb256312bf4a24278fd52fb6c35
-
SHA256
647603b47dfe2941d5e633b732ae9ddb92a7c19338b4b7ea322ef2c196b53444
-
SHA512
4b84d86127a7f26fae7cf579d1b4cd520d78262cdbfaa177552e9b90b84798e29a4a60430e2a2a9023807d2da98d47131a297f6aeb4da47dd5e4553b09411e5c
-
SSDEEP
384:FZcpzCIqdG3A3WUkx38GZDJuJbf1+o44u8gHzUB9eiIslTr3RopL7EEX:SCIqdH/k1ZVcT194jp4+iIsl/3K17Eg
Malware Config
Signatures
-
Detects MyDoom family 1 IoCs
resource yara_rule static1/unpack001/out.upx family_mydoom -
Mydoom family
-
resource yara_rule sample upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource JaffaCakes118_6413404ffe12dae183e6a7223b51c1c0 unpack001/out.upx
Files
-
JaffaCakes118_6413404ffe12dae183e6a7223b51c1c0.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 24KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 17KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 30KB - Virtual size: 30KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ