Behavioral task
behavioral1
Sample
mycheat/MyCheat.dll
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
mycheat/MyCheat.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
mycheat/RENAME.exe
Resource
win7-20240215-en
Behavioral task
behavioral4
Sample
mycheat/RENAME.exe
Resource
win10v2004-20240426-en
General
-
Target
5f0b1174de64a6267e51c1d9bf8a20dc_JaffaCakes118
-
Size
41KB
-
MD5
5f0b1174de64a6267e51c1d9bf8a20dc
-
SHA1
a1f3d1620f3a6dd835ec82340be1ad653293e70c
-
SHA256
84bbcaff42ecf8f855ec7cd2e786040dd2ade5292c7241172e561d0b43a54610
-
SHA512
53fd07ee2f6ab060530df25925c6486bc3725c3bea20bcab4bcb94c5fc6c4c2a05ff02b14a1fecc82417ca133392ad18bf244e9a249b42c78587b5496a2c6472
-
SSDEEP
768:6DiWkDrrdon2Rf09G9QTm9JTL92ZXevwGW+EJLCkEv8C6PunyMg+OB/T3qaKfbS:1ZNonN9+QTm9lL92xiZWRLC6Q20O
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule static1/unpack001/mycheat/MyCheat.dll acprotect -
resource yara_rule static1/unpack001/mycheat/MyCheat.dll upx -
Unsigned PE 3 IoCs
Checks for missing Authenticode signature.
resource unpack001/mycheat/MyCheat.dll unpack002/out.upx unpack001/mycheat/RENAME.exe
Files
-
5f0b1174de64a6267e51c1d9bf8a20dc_JaffaCakes118.rar
-
mycheat/CVAR.cfg
-
mycheat/MyCheat.dll.dll windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Sections
UPX0 Size: - Virtual size: 64KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 40KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.dll windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Sections
.text Size: 55KB - Virtual size: 54KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
mycheat/RENAME.exe.exe windows:4 windows x86 arch:x86
9d7a9578c4c39e835caa091c1632ee8a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
PathStripPathA
kernel32
GetProcAddress
GetModuleFileNameA
CloseHandle
Process32Next
lstrcmpiA
Process32First
CreateToolhelp32Snapshot
VirtualFreeEx
WaitForSingleObject
CreateRemoteThread
OpenProcess
GetModuleHandleA
WriteProcessMemory
VirtualAllocEx
TerminateProcess
user32
MessageBoxA
wsprintfA
Sections
.text Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE