Behavioral task
behavioral1
Sample
fa4b12f186372aeb30ebdc3fd8afa749_JaffaCakes118.dll
Resource
win7-20240903-en
General
-
Target
fa4b12f186372aeb30ebdc3fd8afa749_JaffaCakes118
-
Size
2.4MB
-
MD5
fa4b12f186372aeb30ebdc3fd8afa749
-
SHA1
bd128bd84743613b70122fa7ddbb4706ba12910f
-
SHA256
0d8cc925624908d7ed7405a88d9bc961cb1cb0e5ba4ae62bbb8f430dff454675
-
SHA512
5d05537f83f69884066434c5e5296a140b000ba3a53baa781c7402e20b4417acfad6e3ab90ac3e5dbad8a654872c31d4ad67d7561c67c0fb14c4626424788355
-
SSDEEP
49152:Abd3HXOx8sjIimbtCqQRfevvRHuzD2bWKfbd3HXCfFTlmuM9mDM:khOxDjCNQRmvh+D2bWKThC
Malware Config
Signatures
-
resource yara_rule sample vmprotect -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource fa4b12f186372aeb30ebdc3fd8afa749_JaffaCakes118
Files
-
fa4b12f186372aeb30ebdc3fd8afa749_JaffaCakes118.dll windows:6 windows x86 arch:x86
f0502948420e12bfa9e3319452d501b0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
GetVersionExW
GetModuleHandleExW
GetModuleFileNameW
GetModuleHandleA
LoadLibraryA
LocalAlloc
LocalFree
GetModuleFileNameA
ExitProcess
user32
SetWindowLongW
d3dx9_43
D3DXCreateTextureFromFileInMemoryEx
imm32
ImmSetCompositionWindow
xinput1_3
ord2
Sections
.text Size: - Virtual size: 656KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 435KB - Virtual size: 435KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 171KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: - Virtual size: 314KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp1 Size: 2.0MB - Virtual size: 2.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 469B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ