Behavioral task
behavioral1
Sample
761648e884ac9077f4b9c2f46f652965_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
761648e884ac9077f4b9c2f46f652965_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
761648e884ac9077f4b9c2f46f652965_JaffaCakes118
-
Size
64KB
-
MD5
761648e884ac9077f4b9c2f46f652965
-
SHA1
7b85d4208f10d6336e40df8369f8cf8b9db85d79
-
SHA256
4727a3993b1e0778ce64c720cee11d5b5ebb73369acc3619e96c951791b08733
-
SHA512
f9fc1e37ba5075967e2536cf0cf4d7146e47e146d1e376cef364459cb22545c29a64ccde6221c78ea958c4763c6633406eacfb22b4f345a073c84c17bad21a24
-
SSDEEP
1536:JCS4pN9WmCNWlEufdX9JungOzp+edWTgLrpp/dmf:JCnsNWlN7MngwUYk
Malware Config
Signatures
-
resource yara_rule sample aspack_v212_v242 -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 761648e884ac9077f4b9c2f46f652965_JaffaCakes118
Files
-
761648e884ac9077f4b9c2f46f652965_JaffaCakes118.dll windows:5 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Sections
.text Size: 15KB - Virtual size: 40KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 10KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.aspack Size: 15KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.adata Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE