Behavioral task
behavioral1
Sample
8b72d2b2faedb8662bab2eadb5154d1a_JaffaCakes118.dll
Resource
win7-20240729-en
General
-
Target
8b72d2b2faedb8662bab2eadb5154d1a_JaffaCakes118
-
Size
96KB
-
MD5
8b72d2b2faedb8662bab2eadb5154d1a
-
SHA1
f55f8b95ee594c0b84ce9acc1f042e6b0bd485f8
-
SHA256
c0214cde1804c4162a5949ec0b4a5d2e8f55288555e152b1a25feb60c345228d
-
SHA512
152ad7a6f4e5473806ed60a4ea3f5350e923a07e820a7c0e4270b46fb1db1909c888c3f1aaf78a697f5c9bf7ee2651fcec26973945c3c60a97336dd760eca5e2
-
SSDEEP
1536:zZkREfD3NiSgl5yP+l5wKhpzf+qhh1td8HKPh6o6CbROCzmdd6CXxxVin+R:z6i73Njgl5yP58PL1td8+KkVK9Xx7nR
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8b72d2b2faedb8662bab2eadb5154d1a_JaffaCakes118
Files
-
8b72d2b2faedb8662bab2eadb5154d1a_JaffaCakes118.dll windows:4 windows x86 arch:x86
05c7df6d575c13faf78878f9450f3b20
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
LoadLibraryA
GetProcAddress
ExitProcess
Sections
UPX0 Size: - Virtual size: 62KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Shared Size: 4KB - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX4 Size: - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX5 Size: - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX6 Size: 82KB - Virtual size: 84KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX7 Size: 1023B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 256B - Virtual size:
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE