Static task
static1
Behavioral task
behavioral1
Sample
8576e8a9d91ec9293ca05983c2b5dcd6_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
8576e8a9d91ec9293ca05983c2b5dcd6_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
8576e8a9d91ec9293ca05983c2b5dcd6_JaffaCakes118
-
Size
97KB
-
MD5
8576e8a9d91ec9293ca05983c2b5dcd6
-
SHA1
edae50a450cb2870fb589a3c89086334fe76b33b
-
SHA256
cb3e7ec3ba767ee1ce489460596bfe9f618b7e47e657499b9f27bbaa79c3b3c8
-
SHA512
19dd74d0427c5ae0defe560f6d61da405c0788e6331fdb196180a1c5de87b8dc6def3c815716f050fc4f5908496263d425c29218e9795a79146fd9d670a8c7da
-
SSDEEP
3072:2Hajgb/9ghTXekHFf4FgGkFnK5SWxOcJgc:2HCW/9STXtFQy7Fnryp2c
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule sample acprotect -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8576e8a9d91ec9293ca05983c2b5dcd6_JaffaCakes118
Files
-
8576e8a9d91ec9293ca05983c2b5dcd6_JaffaCakes118.dll windows:4 windows x86 arch:x86
fdbfec85672f73d2a4d49635454936d4
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
GetProcAddress
GetModuleHandleA
LoadLibraryA
ExitProcess
user32
MessageBoxA
Sections
.text Size: 512B - Virtual size: 110B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 140B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 4B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.perplex Size: 94KB - Virtual size: 94KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE