Static task
static1
Behavioral task
behavioral1
Sample
XYZteam VIP.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
XYZteam VIP.dll
Resource
win10v2004-20240802-en
General
-
Target
d62b560a8007fec950dd1df16cf7a061_JaffaCakes118
-
Size
127KB
-
MD5
d62b560a8007fec950dd1df16cf7a061
-
SHA1
7adb5e4986072ed1871f2963a9c73176a6fe20b6
-
SHA256
0b8f95bd387be247eebcd265c420630161cb2898c7114045cfb076b1a6a2328e
-
SHA512
f2b70fc73bfa53defacf3a0748e4ac8afd58f2a8a0d93fd987b0918e1f10b0eb50052843ccd1e2042df81b48bbf03d1135cd1560a1025baf597c5d05fa1e8cb3
-
SSDEEP
3072:C8ukv3im06PCVmU/wSCCxdEorgcjgOpt58UUe+Uu25sbuEWcIh:C8ukK1kCfX7Eorgcj06ufIh
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/XYZteam VIP.dll
Files
-
d62b560a8007fec950dd1df16cf7a061_JaffaCakes118.rar
-
XYZteam VIP.dll.dll windows:5 windows x86 arch:x86
35fd7b4249dafc0944f34c6b9fac1a6c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
CreateThread
GetModuleHandleA
GetProcAddress
Sleep
GetProcessHeap
HeapAlloc
IsProcessorFeaturePresent
user32
GetAsyncKeyState
GetSystemMetrics
d3dx9_40
D3DXCreateTextureFromFileInMemory
D3DXCreateSprite
D3DXCreateFontA
msvcr100
_except_handler3
sprintf
Sections
.text Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 29KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 436B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.text Size: 252KB - Virtual size: 256KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE