Behavioral task
behavioral1
Sample
4f1d0ad740d91f897e7a7b6942cd6ee2_JaffaCakes118.dll
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
4f1d0ad740d91f897e7a7b6942cd6ee2_JaffaCakes118.dll
Resource
win10v2004-20241007-en
General
-
Target
4f1d0ad740d91f897e7a7b6942cd6ee2_JaffaCakes118
-
Size
41KB
-
MD5
4f1d0ad740d91f897e7a7b6942cd6ee2
-
SHA1
50e849884fac59118501bc68963d0da83f7f4d40
-
SHA256
a82284bf77bb12ac314acd15c2e5c50f3dac6c038dcd5d8710b588314ee14e0e
-
SHA512
920965020b0efc13d3a040863513f8b96b0d46cb32b228b7f73e3505967f3953aac07c806d789285e25df78634bd70441f93a9b4fa1f1b56046cbd94ad9bb52f
-
SSDEEP
768:jV0mwyu/yMgLbTUjgsrcijSMN9jThqphdhJPn5R:imwy+ksrXSqUphHJRR
Malware Config
Extracted
jupyter
AG-2
http://167.88.15.115
Signatures
-
Jupyter Backdoor/Client payload 1 IoCs
Processes:
resource yara_rule sample family_jupyter -
Jupyter family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 4f1d0ad740d91f897e7a7b6942cd6ee2_JaffaCakes118
Files
-
4f1d0ad740d91f897e7a7b6942cd6ee2_JaffaCakes118.dll windows:4 windows x86 arch:x86
dae02f32a21e03ce65412f6e56942daa
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
mscoree
_CorDllMain
Sections
.text Size: 39KB - Virtual size: 39KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 792B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ