Behavioral task
behavioral1
Sample
fb348bb50974fd76c28b2324c76eb142_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
fb348bb50974fd76c28b2324c76eb142_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
fb348bb50974fd76c28b2324c76eb142_JaffaCakes118
-
Size
24KB
-
MD5
fb348bb50974fd76c28b2324c76eb142
-
SHA1
566917ce538ad407584c806ee52555bb99cdaa62
-
SHA256
b7b36e6224088c43b849fa72c4417390eb92235318648242ce905e225fb6b419
-
SHA512
f52296a37a258480ce063faa819f3272ade52240ef0a9da5a098342c21517329270d40e0a69c3fa723db2403b423b4d8159cf7848c46870e5952fc6787fc7667
-
SSDEEP
384:JrjCo28CVWHY5IkpqkDZCUXfzAFcCLK9lbWw2Rv+XZeqkYl6/zKIjfyx7HL:JKACVWaplgUUyCLUWwLXZeUczhObL
Malware Config
Signatures
-
resource yara_rule sample vmprotect -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource fb348bb50974fd76c28b2324c76eb142_JaffaCakes118
Files
-
fb348bb50974fd76c28b2324c76eb142_JaffaCakes118.exe windows:4 windows x86 arch:x86
92b6fae7ecea25db8e47e4c3a68464d2
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ws2_32
WSASocketA
setsockopt
htonl
sendto
inet_addr
gethostbyname
recv
WSACleanup
WSAGetLastError
closesocket
WSAStartup
socket
htons
connect
send
WSAAsyncSelect
kernel32
FreeLibrary
LocalFree
MapViewOfFile
CloseHandle
UnmapViewOfFile
GetCurrentProcess
GetVersionExA
GetTickCount
CopyFileA
GetSystemDirectoryA
GetModuleHandleA
SetFileTime
CreateFileMappingA
CreateFileA
GetFileTime
LoadLibraryA
GetFileAttributesA
FindClose
FindNextFileA
FindFirstFileA
GetDriveTypeA
GetLastError
CreateMutexA
DeleteFileA
ExitProcess
GetModuleFileNameA
SetPriorityClass
Process32Next
Process32First
CreateToolhelp32Snapshot
CreateThread
WriteFile
Sleep
ResumeThread
CreateProcessA
ExpandEnvironmentStringsA
GetTempPathA
MoveFileA
GlobalMemoryStatus
GetComputerNameA
GetCurrentProcessId
HeapAlloc
GetProcAddress
GetStartupInfoA
GetCommandLineA
SetFileAttributesA
GetProcessHeap
VirtualProtect
user32
wsprintfA
DefWindowProcA
ExitWindowsEx
PostQuitMessage
RegisterClassA
CreateWindowExA
ShowWindow
UpdateWindow
SendMessageA
GetMessageA
TranslateMessage
DispatchMessageA
advapi32
OpenServiceA
ChangeServiceConfigA
StartServiceA
OpenSCManagerA
SetSecurityInfo
SetEntriesInAclA
QueryServiceStatus
ControlService
CloseServiceHandle
RegOpenKeyExA
RegRestoreKeyA
RegisterServiceCtrlHandlerA
SetServiceStatus
StartServiceCtrlDispatcherA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
GetSecurityInfo
msvcp60
??1_Winit@std@@QAE@XZ
??0_Winit@std@@QAE@XZ
??1Init@ios_base@std@@QAE@XZ
??0Init@ios_base@std@@QAE@XZ
msvcrt
sprintf
memmove
_stricmp
strstr
_itoa
srand
rand
fopen
atoi
strncpy
strcspn
__CxxFrameHandler
printf
fprintf
malloc
_strlwr
fclose
Sections
.text Size: - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp1 Size: 22KB - Virtual size: 22KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1024B - Virtual size: 536B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ