MainThread
Behavioral task
behavioral1
Sample
5a5129dae11008496f94a3b8a7d98450_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
5a5129dae11008496f94a3b8a7d98450_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
5a5129dae11008496f94a3b8a7d98450_JaffaCakes118
-
Size
21KB
-
MD5
5a5129dae11008496f94a3b8a7d98450
-
SHA1
ce56988fa9758dcedd7d2b2499c636bcaf6a7db9
-
SHA256
d410214b53962062f4c1b93157ac242878784ad41540670db8bc7f547cb7912d
-
SHA512
8b3fa711fee9fdd880e663e9ccc47882144e0f4af4888751c4c7043479fa7c459aec3d5b5989f335f7ed6161e64b0c476f2556a5d5ae168a9a5fdebf4e367e3b
-
SSDEEP
384:/nI64v50v5vQTquwTj88aTNqnKOxhKgqcOMkKqJh2aFw3VNoVddqj/v99+y9PtbC:/NY525eqx88Sw3ezBTFU0vCXT9P9qh
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule sample acprotect -
resource yara_rule sample upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource 5a5129dae11008496f94a3b8a7d98450_JaffaCakes118 unpack001/out.upx
Files
-
5a5129dae11008496f94a3b8a7d98450_JaffaCakes118.dll windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Exports
Exports
Sections
UPX0 Size: - Virtual size: 124KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 19KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.dll windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Sections
.data Size: 131KB - Virtual size: 130KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ