CPlApplet
Behavioral task
behavioral1
Sample
COPIA_CHEQUES_0003723_PDF_000000000000000000P0O0000000000000000000837607.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
COPIA_CHEQUES_0003723_PDF_000000000000000000P0O0000000000000000000837607.dll
Resource
win10v2004-20240709-en
General
-
Target
5ce11c7c6d135a4ff7811f2dc7f96c91_JaffaCakes118
-
Size
144KB
-
MD5
5ce11c7c6d135a4ff7811f2dc7f96c91
-
SHA1
d0e90b0ba211d0710d9610970e31e7da5de3d5f4
-
SHA256
6d8a2c1742fa6624da16e3a1227179ce03845fe391cdd35f1c7bfbc08737723b
-
SHA512
0bd4ce9f8bccdfb43f4d3470b0dc05aeb96e816147f0b2561e948e01b6dc0fff2697d5b59b9a9b39e90052c0734645e698398c0ad44aeb9b6a09afe64809bf70
-
SSDEEP
3072:xsrPw1KceLSZBmWVN351sUON54c1C451FALXdzA05zThKjcyiz1O1f4q/JSr:OrI1I+ZBmW/3s1740JGK0FThU0Q48kr
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule static1/unpack001/COPIA_CHEQUES_0003723_PDF_000000000000000000P0O0000000000000000000837607.cpl acprotect -
resource yara_rule static1/unpack001/COPIA_CHEQUES_0003723_PDF_000000000000000000P0O0000000000000000000837607.cpl upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource unpack001/COPIA_CHEQUES_0003723_PDF_000000000000000000P0O0000000000000000000837607.cpl unpack002/out.upx
Files
-
5ce11c7c6d135a4ff7811f2dc7f96c91_JaffaCakes118.zip
-
COPIA_CHEQUES_0003723_PDF_000000000000000000P0O0000000000000000000837607.cpl.dll windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
Exports
Exports
Sections
UPX0 Size: - Virtual size: 296KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 136KB - Virtual size: 140KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.dll windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
Sections
.text Size: 311KB - Virtual size: 310KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.itext Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: - Virtual size: 22KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 512B - Virtual size: 80B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 25KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.rsrc Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ