Behavioral task
behavioral1
Sample
622bf4889d7aa3407d3a2fe6a30fbd4d_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
622bf4889d7aa3407d3a2fe6a30fbd4d_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
622bf4889d7aa3407d3a2fe6a30fbd4d_JaffaCakes118
-
Size
1.1MB
-
MD5
622bf4889d7aa3407d3a2fe6a30fbd4d
-
SHA1
c880d8140652fd25717d63a7c80e789b88f33d63
-
SHA256
14aabbfdfdbabbe33c1d51129dfb19c7e027bc00dc494428e6c108c4d735202f
-
SHA512
b01e794c2f24326be8871fb969c6118071415462cff818a19f94e02120fe77a47c04329b84bcf891241d0cd5a55dae18be4b1695f5902f00fdec3fa88074c24b
-
SSDEEP
24576:s7WuHmDZj4cZ63+S+QSQPUtp8aM8t3W5pzvwalH4yu1I:QWuHmp76GJQPUtpJMyEpqe
Malware Config
Signatures
-
resource yara_rule sample aspack_v212_v242 -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 622bf4889d7aa3407d3a2fe6a30fbd4d_JaffaCakes118
Files
-
622bf4889d7aa3407d3a2fe6a30fbd4d_JaffaCakes118.dll windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Sections
Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 818KB - Virtual size: 1.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 1024B - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.neet Size: 303KB - Virtual size: 304KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.adata Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE