Behavioral task
behavioral1
Sample
1d101557dc7b95085ba874ac4bdb38dc_JaffaCakes118.dll
Resource
win7-20240611-en
General
-
Target
1d101557dc7b95085ba874ac4bdb38dc_JaffaCakes118
-
Size
3.0MB
-
MD5
1d101557dc7b95085ba874ac4bdb38dc
-
SHA1
d92e541c707cb8825860ba8f3bf801b06fb5b0c2
-
SHA256
21249ce24600b1feac26a2a9883f3c6de299681a924be281630bc3869f0f4044
-
SHA512
31dffd6ab386d1e6df37d9aa0333c2d16b3e154d2557bf1d8bb39ae313285ae4fc463a4ed92b8a86f39ff4a624d35dfc83c1b7567e634a96e29b47347e5d6e2f
-
SSDEEP
49152:dqGB2KwBl+dyMzac4d12JVb4ZwDI0A3dQIOOtxE5/8ojWVVidT7gU9Y7xV:FB1wBlYykZ4L2JVkWQ3REJjWS7M7xV
Malware Config
Signatures
-
Processes:
resource yara_rule sample vmprotect
Files
-
1d101557dc7b95085ba874ac4bdb38dc_JaffaCakes118.dll regsvr32 windows:6 windows x64 arch:x64
3de301e08dd1ae399d773905af5ee028
Code Sign
22:ba:ca:91:ad:d8:d0:85:45:f1:08:9a:02:db:71:00Certificate
IssuerCN=Intel Corp LLCNot Before18-02-2021 12:15Not After19-02-2031 12:15SubjectCN=Intel Corp LLC8c:77:a0:00:8f:f4:d1:b0:c6:3d:9f:3a:48:83:8d:6bCertificate
IssuerCN=Sectigo RSA Time Stamping CA,O=Sectigo Limited,L=Salford,ST=Greater Manchester,C=GBNot Before23-10-2020 00:00Not After22-01-2032 23:59SubjectCN=Sectigo RSA Time Stamping Signer #2,O=Sectigo Limited,L=Salford,ST=Greater Manchester,C=GBExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
30:0f:6f:ac:dd:66:98:74:7c:a9:46:36:a7:78:2d:b9Certificate
IssuerCN=USERTrust RSA Certification Authority,O=The USERTRUST Network,L=Jersey City,ST=New Jersey,C=USNot Before02-05-2019 00:00Not After18-01-2038 23:59SubjectCN=Sectigo RSA Time Stamping CA,O=Sectigo Limited,L=Salford,ST=Greater Manchester,C=GBExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
16:21:bf:b2:bb:e3:13:18:87:48:c1:83:81:5c:d7:f4:68:f0:25:83:f1:67:3a:79:75:3f:0c:98:cc:61:14:adSigner
Actual PE Digest16:21:bf:b2:bb:e3:13:18:87:48:c1:83:81:5c:d7:f4:68:f0:25:83:f1:67:3a:79:75:3f:0c:98:cc:61:14:adDigest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
Imports
shell32
SHGetFolderPathA
user32
wsprintfA
GetProcessWindowStation
GetUserObjectInformationW
advapi32
GetUserNameA
kernel32
CreateProcessA
LocalAlloc
LocalFree
GetModuleFileNameW
GetProcessAffinityMask
SetProcessAffinityMask
SetThreadAffinityMask
Sleep
ExitProcess
FreeLibrary
LoadLibraryA
GetModuleHandleA
GetProcAddress
winhttp
WinHttpQueryDataAvailable
msvcrt
memset
Exports
Exports
DllRegisterServer
Sections
.text Size: - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
bss Size: - Virtual size: 8B
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 128B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: - Virtual size: 228B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vmp0 Size: - Virtual size: 1.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: 3.0MB - Virtual size: 3.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 144B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ