c:\Users\DrPhil\Documents\Visual Studio 2008\Projects\Injectorv3\Release\Injectorv3.pdb
Behavioral task
behavioral1
Sample
CheatHack.Ru.url
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
CheatHack.Ru.url
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
Release - EvilHook V1/EvilHookv1.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Release - EvilHook V1/EvilHookv1.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
Release - EvilHook V1/EvilHookv1.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
Release - EvilHook V1/EvilHookv1.exe
Resource
win10v2004-20240802-en
General
-
Target
0ec9b4369da840e57d4541459b711ee3_JaffaCakes118
-
Size
438KB
-
MD5
0ec9b4369da840e57d4541459b711ee3
-
SHA1
c4d70b63657e74562ff03a387f21377c02585c9e
-
SHA256
77c14b626829bfd81c543301c3b760c561b4d7b89f6b90db8c614dd4dfebed3b
-
SHA512
4a534a6b7c2876c2ff835f85a4486475e543ed617991704fe3d8a24eb2c0f49752e35729cdb35a1b348e05b75e8da323f74e88489151a878f68fbd5b371269af
-
SSDEEP
12288:W3lKi/UkzaDR8PAVZwLbzwYHZQ5QWu3CGl5a7I/stD:W11lGZULbz3ySh3l9/UD
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule static1/unpack001/Release - EvilHook V1/EvilHookv1.dll acprotect -
resource yara_rule static1/unpack001/Release - EvilHook V1/EvilHookv1.dll upx -
Unsigned PE 3 IoCs
Checks for missing Authenticode signature.
resource unpack001/Release - EvilHook V1/EvilHookv1.dll unpack002/out.upx unpack001/Release - EvilHook V1/EvilHookv1.exe
Files
-
0ec9b4369da840e57d4541459b711ee3_JaffaCakes118.zip
-
CheatHack.Ru.url.url
-
Release - EvilHook V1/EvilHookv1.dll.dll windows:5 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Sections
UPX0 Size: - Virtual size: 228KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 89KB - Virtual size: 92KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.dll windows:5 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Sections
.text Size: 150KB - Virtual size: 149KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 31KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 39KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
Release - EvilHook V1/EvilHookv1.exe.exe windows:5 windows x86 arch:x86
7d6028dc4a6077c3d83d1f78b310090f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
msvcr90
_stricmp
__FrameUnwindFilter
_encoded_null
_decode_pointer
_encode_pointer
_amsg_exit
_cexit
strcat
strlen
sprintf
exit
strcpy
memset
msvcm90
?RegisterModuleUninitializer@<CrtImplementationDetails>@@YAXP$AAVEventHandler@System@@@Z
?ThrowModuleLoadException@<CrtImplementationDetails>@@YAXP$AAVString@System@@@Z
?ThrowNestedModuleLoadException@<CrtImplementationDetails>@@YAXP$AAVException@System@@0@Z
?DoCallBackInDefaultDomain@<CrtImplementationDetails>@@YAXP6GJPAX@Z0@Z
?DoDllLanguageSupportValidation@<CrtImplementationDetails>@@YAXXZ
?ThrowModuleLoadException@<CrtImplementationDetails>@@YAXP$AAVString@System@@P$AAVException@3@@Z
kernel32
WriteProcessMemory
TerminateProcess
GetModuleFileNameA
GetLastError
CreateMutexA
FindFirstFileA
Thread32Next
Thread32First
Process32Next
Process32First
CreateToolhelp32Snapshot
LoadLibraryA
GetExitCodeThread
WaitForSingleObject
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
GetVersion
GetProcAddress
GetModuleHandleA
CloseHandle
OpenProcess
GlobalAlloc
ReadProcessMemory
GlobalFree
GetThreadContext
VirtualProtectEx
CreateRemoteThread
ResumeThread
Sleep
SuspendThread
SetThreadContext
ExitProcess
CreateThread
mscoree
_CorExeMain
Sections
.text Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 381KB - Virtual size: 380KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
ᠭ.txt