Run
Behavioral task
behavioral1
Sample
ef9040fdd6743f451163a8935339655a_JaffaCakes118.dll
Resource
win7-20240729-en
General
-
Target
ef9040fdd6743f451163a8935339655a_JaffaCakes118
-
Size
33KB
-
MD5
ef9040fdd6743f451163a8935339655a
-
SHA1
769dc335ac3fe4fd848bd7cb3dcd39cd0a537e99
-
SHA256
5ec0087e7b32e5c72e61a2acf09141218af327024f096f99b882b488c54121f5
-
SHA512
14492e0d349943a40f9921366dbedb5aec8e327bcc64493b31703e986b650c000821b9d5f6b7868b9808cd3ad27f374c38b6bd2f4f38e22c6b187614adfc8305
-
SSDEEP
768:ygK8hSw7EFnbAXxsSxPQ7uTJpibQWLQRMO6uNR0tHM:y3yEFb6kaT/i3LQRMRuNR
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule sample acprotect -
resource yara_rule sample upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource ef9040fdd6743f451163a8935339655a_JaffaCakes118 unpack001/out.upx
Files
-
ef9040fdd6743f451163a8935339655a_JaffaCakes118.dll windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Exports
Exports
Sections
UPX0 Size: - Virtual size: 56KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 31KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.dll windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Sections
.text Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ