Behavioral task
behavioral1
Sample
e0ec3324ec5ebd789c20c6d072cee40c_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e0ec3324ec5ebd789c20c6d072cee40c_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
e0ec3324ec5ebd789c20c6d072cee40c_JaffaCakes118
-
Size
852KB
-
MD5
e0ec3324ec5ebd789c20c6d072cee40c
-
SHA1
3f17af6a54408c6768d1b7d8ac352eccaeba0c93
-
SHA256
b2497de81be048d91f3518514d136f06ed772af0233c640d74e1213c00774c14
-
SHA512
9ab73f53204318a6fb3854de351ec25781513f1192fc6880309a84c9319a24898824bfcb03bcc979345d18d3d5eaea05e9f1d69c308198f613cc80c873a2b2a8
-
SSDEEP
24576:1JEozF+MgyJSgGdHlBmn6GXm3uMRgwD5:vEoFFGXBmPouig
Malware Config
Signatures
-
resource yara_rule sample vmprotect -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e0ec3324ec5ebd789c20c6d072cee40c_JaffaCakes118
Files
-
e0ec3324ec5ebd789c20c6d072cee40c_JaffaCakes118.exe windows:5 windows x86 arch:x86
adf649cfc801721f7b28172924631073
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ddraw
DirectDrawCreateEx
dinput
DirectInputCreateA
dsound
DirectSoundCreate
gdi32
CreateFontA
CreateCompatibleDC
CreateCompatibleBitmap
SelectObject
TextOutA
GetDIBits
DeleteObject
StretchDIBits
GetDeviceCaps
SetBkMode
SetTextColor
GetStockObject
BitBlt
imm32
ImmAssociateContext
ImmCreateContext
ImmReleaseContext
ImmIsIME
ImmSetOpenStatus
ImmGetConversionStatus
ImmGetDescriptionA
ImmGetCompositionStringA
ImmGetCandidateListA
kernel32
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
RaiseException
InitializeCriticalSectionAndSpinCount
GetStringTypeA
GetStringTypeW
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
LCMapStringW
LCMapStringA
SetStdHandle
GetTickCount
GlobalUnlock
GlobalLock
lstrcpy
GlobalAlloc
CloseHandle
WriteFile
CreateFileA
GlobalFree
GlobalHandle
_lclose
_hread
OpenFile
FindClose
FindNextFileA
FindFirstFileA
MultiByteToWideChar
GetFileSize
Sleep
WinExec
ReleaseMutex
SystemTimeToFileTime
GetSystemTime
FreeLibrary
GetProcAddress
OutputDebugStringA
LoadLibraryA
MapViewOfFile
OpenFileMappingA
GetLastError
CreateMutexA
GetModuleFileNameA
LoadResource
FindResourceA
ExitThread
WaitForMultipleObjects
CreateThread
IsDBCSLeadByte
ReadFile
GetCurrentProcessId
GetVersionExA
OpenMutexA
GetModuleHandleA
IsBadReadPtr
GetCurrentThreadId
CopyFileA
DeleteFileA
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
SetFilePointer
GetTimeZoneInformation
LockResource
FlushFileBuffers
GetConsoleMode
GetConsoleCP
WideCharToMultiByte
HeapSize
GetStdHandle
ExitProcess
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
InterlockedDecrement
SetLastError
InterlockedIncrement
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetModuleHandleW
HeapReAlloc
VirtualAlloc
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
VirtualFree
HeapCreate
GetStartupInfoA
GetCommandLineA
SetCurrentDirectoryA
GetCurrentDirectoryA
SetEnvironmentVariableA
GetFileType
PeekNamedPipe
GetFileInformationByHandle
FileTimeToLocalFileTime
FileTimeToSystemTime
CreateDirectoryA
GetLocaleInfoA
SetEndOfFile
CreateEventA
GetProcessHeap
CompareStringA
CompareStringW
ReadConsoleInputA
SetConsoleMode
GetSystemTimeAsFileTime
RtlUnwind
HeapAlloc
HeapFree
GetModuleFileNameW
GetModuleHandleA
LoadLibraryA
LocalAlloc
LocalFree
GetModuleFileNameA
ExitProcess
netapi32
Netbios
user32
GetDC
RegisterClassExA
SetCursorPos
GetDoubleClickTime
GetCursorPos
ScreenToClient
GetWindowLongA
DestroyWindow
PostQuitMessage
DefWindowProcA
SetCursor
PeekMessageA
TranslateMessage
DispatchMessageA
AdjustWindowRectEx
CreateWindowExA
SetWindowLongA
ShowWindow
SetWindowPos
UpdateWindow
GetSysColor
LoadIconA
RegisterClassA
GetDesktopWindow
SetFocus
keybd_event
SetWindowTextA
GetKeyboardState
GetKeyboardLayout
GetWindowTextA
GetWindowRect
EnumWindows
PostMessageA
ShowCursor
GetAsyncKeyState
SetRect
ClientToScreen
GetClientRect
OffsetRect
LoadCursorA
ReleaseDC
EmptyClipboard
SetClipboardData
OpenClipboard
GetClipboardData
CloseClipboard
wsprintfA
MessageBoxA
wininet
InternetReadFile
InternetCloseHandle
InternetOpenA
InternetOpenUrlA
winmm
mmioRead
mmioAscend
mmioOpenA
mmioClose
mciSendCommandA
mmioDescend
wsock32
setsockopt
htons
ioctlsocket
gethostbyname
socket
WSAGetLastError
WSACleanup
WSAStartup
select
__WSAFDIsSet
recv
closesocket
send
connect
inet_addr
ole32
CoCreateInstance
CoInitialize
imoli
GameStart
Sections
.text Size: - Virtual size: 1.9MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 94KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 12.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.AddImp Size: - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp1 Size: - Virtual size: 256B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp0 Size: - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: 844KB - Virtual size: 842KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ