Static task
static1
Behavioral task
behavioral1
Sample
Encore plus de cheats - More hacks !.url
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Encore plus de cheats - More hacks !.url
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
EnhancedAim_CSS.dll
Resource
win7-20240705-en
Behavioral task
behavioral4
Sample
EnhancedAim_CSS.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
EnhancedAim_CSS.exe
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
EnhancedAim_CSS.exe
Resource
win10v2004-20240704-en
General
-
Target
7330190bcaaed7ae12dde8d90a097c0d_JaffaCakes118
-
Size
291KB
-
MD5
7330190bcaaed7ae12dde8d90a097c0d
-
SHA1
8e8b6a5f4ac29d61be88d6ea911ef6884b3cfe8b
-
SHA256
75b568e111227bc8b682ee3eda7f9d236089ec6ccfc0d3b419a50e191fb8a610
-
SHA512
2e1c839b2f5e916ac80bab62923f7ba6a3266927033b441b509f90b70dcef970ffb8442d0e7864cd1b4ff92e3fe54ac5ab84fcb07b926ec4682458382112ecec
-
SSDEEP
6144:zQz3hjixLKMnRJwz8Mg7G8G06RhxD38h7sFwkmQ+Bt:zu3JiZ44ZG5nbx78TTND
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule static1/unpack001/EnhancedAim_CSS.dll acprotect -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource unpack001/EnhancedAim_CSS.dll unpack001/EnhancedAim_CSS.exe
Files
-
7330190bcaaed7ae12dde8d90a097c0d_JaffaCakes118.rar
-
Encore plus de cheats - More hacks !.url.url
-
EnhancedAim_CSS.dll.dll windows:1 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Sections
#debug Size: 220KB - Virtual size: 220KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
log Size: 512B - Virtual size: 512B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
EnhancedAim_CSS.exe.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
CODE Size: 427KB - Virtual size: 427KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
DATA Size: 25KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BSS Size: - Virtual size: 75KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: - Virtual size: 16B
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 26KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 44KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
EnhancedAim_CSS_[cracked-#debuglog].nfo
-
READ ME.txt