Behavioral task
behavioral1
Sample
d0d05ca0eace3bbc3337a8cc0e8d614c_JaffaCakes118.dll
Resource
win7-20240903-en
General
-
Target
d0d05ca0eace3bbc3337a8cc0e8d614c_JaffaCakes118
-
Size
4KB
-
MD5
d0d05ca0eace3bbc3337a8cc0e8d614c
-
SHA1
2e8c361f9a042d2084366347d020aeceb14b978e
-
SHA256
944df0f903bb8c5ab82e2af3b433ef9c2e3aed2064fc39f0c5cd9a73e686e2b4
-
SHA512
fde5524eb0a69848be15965e40a3777bb165caab4a4d14544e1d4169c08a6946c39d77a15ba7a83a0a571b1a40398bb7e9ebfbbd4dc4dfe67cc29ef764d9c57a
-
SSDEEP
96:8IHFZLM12EZQav+FNy7ZURi3CMER9MP3Q:FHtLamy7ZV3vNP3
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule sample acprotect -
resource yara_rule sample upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource d0d05ca0eace3bbc3337a8cc0e8d614c_JaffaCakes118 unpack001/out.upx
Files
-
d0d05ca0eace3bbc3337a8cc0e8d614c_JaffaCakes118.dll windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Sections
UPX0 Size: - Virtual size: 80KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.dll windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Sections
.text Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 902B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 60KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1024B - Virtual size: 746B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ