Behavioral task
behavioral1
Sample
449e5d27aeac5db44bc34be62a4da5c0_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
449e5d27aeac5db44bc34be62a4da5c0_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
449e5d27aeac5db44bc34be62a4da5c0_JaffaCakes118
-
Size
94KB
-
MD5
449e5d27aeac5db44bc34be62a4da5c0
-
SHA1
e2b6d44757a1c546c9ca662e6b2418f0b279d0fb
-
SHA256
d68e1561c693b1e6e5c6b38b3bb1b30a25fb0be199a9095b4ddf2be8ce49fa68
-
SHA512
12f6a61110a30ca21b44070f208b9fdbc8c81842ef82ad9be64de63a2c87f280f63dfd3046a244fbe18528e4067b3186ef1745ecd2897eba5396d79e0f1c09fb
-
SSDEEP
1536:JKLQ/kT9KAW7E0BMG1+pgBuL6JNToNoujcIlek+y+Gu9SVjzXVfm:z/kxJN0CbUPJadofEjz4
Malware Config
Signatures
-
resource yara_rule sample aspack_v212_v242 -
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 449e5d27aeac5db44bc34be62a4da5c0_JaffaCakes118
Files
-
449e5d27aeac5db44bc34be62a4da5c0_JaffaCakes118.dll windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
Sections
CODE Size: 53KB - Virtual size: 120KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
DATA Size: 11KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BSS Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 2KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 6KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 15KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.UPX Size: 5KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.adata Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE