Behavioral task
behavioral1
Sample
DLLExportViewer-v1.22/dllexp.chm
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
DLLExportViewer-v1.22/dllexp.chm
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
DLLExportViewer-v1.22/dllexp.exe
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
DLLExportViewer-v1.22/dllexp.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
DLLExportViewer-v1.22/新云软件.url
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
DLLExportViewer-v1.22/新云软件.url
Resource
win10v2004-20240802-en
General
-
Target
e157138b4c1ae19cf54c2964cbf3c672_JaffaCakes118
-
Size
42KB
-
MD5
e157138b4c1ae19cf54c2964cbf3c672
-
SHA1
6d5f3e94a70b410df143db38aa3458aafdef4933
-
SHA256
230b589afd84c799c603ee8393c7aa05b8b4f25786e3d15814a11f0c92e294d4
-
SHA512
55d6177223392ff370f6633c27a56024436344a75e7b5a2db912e5ef7f3b3a3b84120d7f9592ca01c9faf1bca236e706c5282c6e9d4f6cc8c1b223b884bb6cd0
-
SSDEEP
768:TQWny+AVh6TGA5Co2+7IF/+tsy3FP47rw/3n83ToWNvlJyE:TQI0hbApU8ttFP4Xwv83ToalJyE
Malware Config
Signatures
-
Detected Nirsoft tools 1 IoCs
Free utilities often used by attackers which can steal passwords, product keys, etc.
resource yara_rule static1/unpack002/out.upx Nirsoft -
resource yara_rule static1/unpack001/DLLExportViewer-v1.22/dllexp.exe upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource unpack001/DLLExportViewer-v1.22/dllexp.exe unpack002/out.upx
Files
-
e157138b4c1ae19cf54c2964cbf3c672_JaffaCakes118.rar
-
DLLExportViewer-v1.22/dllexp.chm.chm
-
DLLExportViewer-v1.22/dllexp.exe.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 52KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 29KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 40KB - Virtual size: 40KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
DLLExportViewer-v1.22/readme.txt
-
DLLExportViewer-v1.22/新云软件.url.url