MsgProc
Behavioral task
behavioral1
Sample
0c13cc4dc61e2152c734b114f274d7e1_JaffaCakes118.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
0c13cc4dc61e2152c734b114f274d7e1_JaffaCakes118.dll
Resource
win10v2004-20240508-en
General
-
Target
0c13cc4dc61e2152c734b114f274d7e1_JaffaCakes118
-
Size
33KB
-
MD5
0c13cc4dc61e2152c734b114f274d7e1
-
SHA1
c1e51028c2a88921e2189913afd70d70318aba59
-
SHA256
8f7d96bd78c0c3abc35e1b679a081b8bcfc88499dc11c3e1a3d40afa8349ce0b
-
SHA512
f8dd56d956a573d24e4329db9ec72bc147da228aee5a0a0b8377a6689687124532c97603de2937eaff21750503fab397f94e3a00f6aa2f62a57db4fc95be5fcd
-
SSDEEP
768:4PU4UeOTKKpHC3b/e/aQxW48E7a4R9EGlEcgoDXIdbnIx3ha5:34Ue+HebG/aQA4X7z7lEcjXIdbW
Malware Config
Signatures
-
resource yara_rule sample aspack_v212_v242 -
resource yara_rule sample vmprotect -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0c13cc4dc61e2152c734b114f274d7e1_JaffaCakes118
Files
-
0c13cc4dc61e2152c734b114f274d7e1_JaffaCakes118.dll windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Exports
Exports
Sections
.text Size: 12KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: 2KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp1 Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.aspack Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.adata Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE