Behavioral task
behavioral1
Sample
f9b7eb1d33c3b236fe17e07cf6db2345_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f9b7eb1d33c3b236fe17e07cf6db2345_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
f9b7eb1d33c3b236fe17e07cf6db2345_JaffaCakes118
-
Size
1.5MB
-
MD5
f9b7eb1d33c3b236fe17e07cf6db2345
-
SHA1
889d8645047fa82258ac568dc2463109d8582480
-
SHA256
83caf8728ce692b7c35f77e5d51f3b1c9923119efc38a6a11bcff4d12ed8b4d8
-
SHA512
53ff2acd7af08ef23906b3a240442837ee0027e932225f5ed957ba0d842f21c616d1538403dc3a138e0bda2433530889f4d1523234c4424cc968bf05effc14e3
-
SSDEEP
49152:9MEzhh0jsMsCWpoM1s7JUaOoyzphSiegoy0:97hyj3QT1s7nlyzXSiego
Malware Config
Signatures
-
resource yara_rule sample vmprotect -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f9b7eb1d33c3b236fe17e07cf6db2345_JaffaCakes118
Files
-
f9b7eb1d33c3b236fe17e07cf6db2345_JaffaCakes118.exe windows:4 windows x86 arch:x86
50e80c6afb58373b0ae00e7911e92d77
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
CallWindowProcA
TrackMouseEvent
EnableWindow
MessageBoxA
wsprintfA
GetSystemMetrics
GetCursorPos
CloseClipboard
GetClipboardData
OpenClipboard
SetClipboardData
EmptyClipboard
DestroyMenu
PostQuitMessage
PostMessageA
SetCursor
IsWindowEnabled
GetLastActivePopup
GetParent
SetWindowsHookExA
PeekMessageA
IsWindowVisible
ValidateRect
GetClassNameA
GetKeyState
GetActiveWindow
DispatchMessageA
TranslateMessage
GetMessageA
UpdateLayeredWindow
GetFocus
EnableMenuItem
CheckMenuItem
SetMenuItemBitmaps
ModifyMenuA
ReleaseDC
LoadBitmapA
GetMenuCheckMarkDimensions
UnhookWindowsHookEx
UnregisterClassA
PtInRect
GetDlgCtrlID
GetWindow
ClientToScreen
SetWindowTextA
GetWindowTextA
GetMenuItemCount
TabbedTextOutA
DrawTextA
GrayStringA
GetDlgItem
SetWindowPos
SetFocus
EnumWindows
GetAncestor
EnumChildWindows
SetWindowLongA
ShowWindow
IsWindow
GetSysColor
GetNextDlgTabItem
AdjustWindowRectEx
GetWindowPlacement
CreateWindowExA
SendMessageA
SetPropA
GetMessagePos
GetPropA
GetWindowRect
MapWindowPoints
GetDC
LoadIconA
LoadCursorA
GetSysColorBrush
GetMenuState
GetWindowLongA
CallNextHookEx
IsIconic
SystemParametersInfoA
RegisterWindowMessageA
SetForegroundWindow
GetForegroundWindow
GetMessageTime
DefWindowProcA
RemovePropA
GetClassLongA
DestroyWindow
GetMenuItemID
GetSubMenu
GetMenu
RegisterClassA
GetClassInfoA
WinHelpA
GetCapture
GetTopWindow
CopyRect
GetClientRect
LoadStringA
GetWindowTextLengthA
CharUpperA
GetWindowDC
WaitForInputIdle
wsprintfA
CloseClipboard
GetClipboardData
OpenClipboard
SetClipboardData
EmptyClipboard
GetSystemMetrics
GetCursorPos
MessageBoxA
SetWindowPos
SendMessageA
DestroyCursor
SetParent
IsWindow
PostMessageA
GetTopWindow
GetParent
GetFocus
GetClientRect
InvalidateRect
ValidateRect
UpdateWindow
EqualRect
GetWindowRect
SetForegroundWindow
DestroyMenu
IsChild
ReleaseDC
IsRectEmpty
FillRect
GetDC
SetCursor
LoadCursorA
SetCursorPos
SetActiveWindow
GetSysColor
SetWindowLongA
GetWindowLongA
RedrawWindow
EnableWindow
IsWindowVisible
OffsetRect
PtInRect
DestroyIcon
IntersectRect
InflateRect
SetRect
SetScrollPos
SetScrollRange
GetScrollRange
BeginPaint
GetCapture
ReleaseCapture
SetTimer
KillTimer
WinHelpA
LoadBitmapA
CopyRect
ChildWindowFromPointEx
ScreenToClient
GetMessagePos
SetWindowRgn
DestroyAcceleratorTable
GetWindow
GetActiveWindow
UnregisterClassA
IsIconic
PeekMessageA
SetMenu
GetMenu
DeleteMenu
GetSystemMenu
DefWindowProcA
GetClassInfoA
IsZoomed
PostQuitMessage
CopyAcceleratorTableA
GetKeyState
TranslateAcceleratorA
IsWindowEnabled
ShowWindow
SystemParametersInfoA
LoadImageA
EnumDisplaySettingsA
ClientToScreen
EnableMenuItem
GetSubMenu
GetDlgCtrlID
CreateAcceleratorTableA
CreateMenu
ModifyMenuA
AppendMenuA
CreatePopupMenu
DrawIconEx
CreateIconFromResource
CreateIconFromResourceEx
RegisterClipboardFormatA
SetRectEmpty
DispatchMessageA
GetMessageA
WindowFromPoint
DrawFocusRect
DrawEdge
DrawFrameControl
TranslateMessage
LoadIconA
GetForegroundWindow
GetDesktopWindow
GetClassNameA
GetDlgItem
GetWindowTextA
SetWindowTextA
CallWindowProcA
CreateWindowExA
RegisterHotKey
UnregisterHotKey
AdjustWindowRectEx
MapWindowPoints
SendDlgItemMessageA
ScrollWindowEx
IsDialogMessageA
MoveWindow
CheckMenuItem
SetMenuItemBitmaps
GetMenuState
GetMenuCheckMarkDimensions
LoadStringA
GetSysColorBrush
EndPaint
TabbedTextOutA
DrawTextA
GrayStringA
DestroyWindow
CreateDialogIndirectParamA
EndDialog
GetNextDlgTabItem
GetWindowPlacement
RegisterWindowMessageA
GetLastActivePopup
GetMessageTime
RemovePropA
GetPropA
UnhookWindowsHookEx
SetPropA
GetClassLongA
CallNextHookEx
SetWindowsHookExA
GetMenuItemID
GetMenuItemCount
RegisterClassA
GetScrollPos
SetCapture
SetFocus
MessageBoxA
gdi32
RectVisible
PtVisible
GetDeviceCaps
ExtTextOutA
SaveDC
DeleteDC
GetStockObject
CreateBitmap
SetViewportExtEx
RestoreDC
CreateDIBSection
CreateCompatibleDC
SetBkColor
SetTextColor
SetMapMode
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
DeleteObject
GetClipBox
GetObjectA
Escape
ScaleWindowExtEx
TextOutA
SetWindowExtEx
ScaleViewportExtEx
LineTo
MoveToEx
ExcludeClipRect
GetClipBox
ScaleWindowExtEx
SetWindowExtEx
SetWindowOrgEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
SetTextColor
SetROP2
SetPolyFillMode
SetBkMode
RestoreDC
SaveDC
CreateBitmap
SelectObject
GetObjectA
CreatePen
PatBlt
CombineRgn
CreateRectRgn
FillRgn
CreateSolidBrush
CreateFontIndirectA
EndPage
EndDoc
DeleteDC
StartDocA
StartPage
BitBlt
CreateCompatibleDC
Ellipse
Rectangle
LPtoDP
DPtoLP
GetCurrentObject
RoundRect
GetTextExtentPoint32A
GetDeviceCaps
CreatePolygonRgn
GetClipRgn
SetStretchBltMode
SelectClipRgn
CreateRectRgnIndirect
SetBkColor
CreateFontA
TranslateCharsetInfo
ExtSelectClipRgn
GetViewportExtEx
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
GetTextMetricsA
CreateDCA
CreateCompatibleBitmap
GetPolyFillMode
GetStretchBltMode
GetROP2
GetBkColor
GetBkMode
GetTextColor
CreateRoundRectRgn
CreateEllipticRgn
PathToRegion
EndPath
BeginPath
GetWindowOrgEx
GetViewportOrgEx
GetWindowExtEx
GetDIBits
RealizePalette
SelectPalette
StretchBlt
CreatePalette
GetSystemPaletteEntries
CreateDIBitmap
DeleteObject
GetStockObject
gdiplus
GdipLoadImageFromStream
GdipDisposeImage
GdipCreateBitmapFromScan0
GdipGetImageGraphicsContext
GdipCreateFromHDC
GdipSetSmoothingMode
GdipGetImageHeight
GdiplusStartup
GdipGetImageEncoders
GdipGetImageEncodersSize
GdipGetImageWidth
GdipLoadImageFromFile
GdipDrawRectangleI
GdipDeletePen
GdipSetTextRenderingHint
GdipCreateSolidFill
GdipSetSolidFillColor
GdipDeleteBrush
GdipSaveImageToStream
kernel32
lstrcmpA
GlobalDeleteAtom
LocalAlloc
LocalFree
InitializeCriticalSection
TlsAlloc
DeleteCriticalSection
GlobalHandle
TlsFree
LeaveCriticalSection
GlobalReAlloc
LCMapStringW
TlsSetValue
LocalReAlloc
TlsGetValue
InterlockedDecrement
SetErrorMode
lstrcatA
lstrcpyA
lstrcpynA
lstrlenA
GetVersion
GlobalFlags
WritePrivateProfileStringA
InterlockedIncrement
SetLastError
GetLastError
GlobalFindAtomA
GlobalAddAtomA
VirtualAlloc
GetProcessVersion
GetCurrentProcess
SetFilePointer
FlushFileBuffers
GetFileType
GetStartupInfoA
MultiByteToWideChar
lstrlenW
lstrcmpiA
GetProcessHeap
ExitProcess
HeapAlloc
HeapReAlloc
HeapFree
IsBadReadPtr
GetModuleFileNameA
GetPrivateProfileStringA
CloseHandle
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
GetEnvironmentVariableA
GetVersionExA
ReadFile
GetFileSize
CreateFileA
GetTickCount
IsBadWritePtr
GetTempPathA
WriteFile
GlobalUnlock
HeapDestroy
HeapCreate
VirtualFree
FreeLibrary
LCMapStringA
GetProcAddress
LoadLibraryA
LocalSize
MapViewOfFile
CreateFileMappingA
GetModuleHandleA
RtlMoveMemory
GlobalFree
GlobalLock
GlobalAlloc
GetCurrentThread
WideCharToMultiByte
GetCurrentThreadId
SetUnhandledExceptionFilter
GetACP
SetHandleCount
GetStdHandle
GlobalGetAtomNameA
GetStringTypeA
GetStringTypeW
IsBadCodePtr
SetStdHandle
GetCPInfo
GetOEMCP
GetCommandLineA
RtlUnwind
TerminateProcess
RaiseException
EnterCriticalSection
HeapSize
GetLocalTime
GetSystemTime
RtlUnwind
GetStartupInfoA
GetOEMCP
GetCPInfo
GetProcessVersion
SetErrorMode
GlobalFlags
GetCurrentThread
GetFileTime
TlsGetValue
LocalReAlloc
TlsSetValue
TlsFree
GlobalHandle
TlsAlloc
LocalAlloc
lstrcmpA
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
lstrcmpiA
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
DuplicateHandle
lstrcpynA
FileTimeToLocalFileTime
LocalFree
InterlockedDecrement
InterlockedIncrement
RaiseException
HeapSize
GetACP
SetStdHandle
GetFileType
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetEnvironmentVariableA
HeapDestroy
HeapCreate
VirtualFree
FileTimeToSystemTime
GetVersion
GetTimeZoneInformation
SetLastError
TerminateProcess
GetFileSize
SetFilePointer
CreateToolhelp32Snapshot
Process32First
Process32Next
TerminateThread
WideCharToMultiByte
MultiByteToWideChar
GetCurrentProcess
GetWindowsDirectoryA
CreateFileMappingA
MapViewOfFile
UnmapViewOfFile
OpenFileMappingA
ReleaseMutex
GetSystemDirectoryA
CreateSemaphoreA
ResumeThread
ReleaseSemaphore
EnterCriticalSection
LeaveCriticalSection
GetProfileStringA
SetEnvironmentVariableA
LCMapStringA
LCMapStringW
VirtualAlloc
IsBadWritePtr
SetUnhandledExceptionFilter
GetStringTypeA
GetStringTypeW
CompareStringA
CompareStringW
IsBadReadPtr
IsBadCodePtr
InterlockedExchange
WriteFile
ReadFile
GetLastError
WaitForMultipleObjects
CreateFileA
SetEvent
FindResourceA
LoadResource
LockResource
RemoveDirectoryA
GetModuleFileNameA
GetCurrentThreadId
ExitProcess
GlobalSize
GlobalFree
DeleteCriticalSection
InitializeCriticalSection
lstrcatA
lstrlenA
WinExec
lstrcpyA
FindNextFileA
GlobalReAlloc
HeapFree
CloseHandle
WaitForSingleObject
CreateProcessA
GetTickCount
GetCommandLineA
MulDiv
GetProcAddress
GetModuleHandleA
GetVolumeInformationA
SetCurrentDirectoryA
CreateDirectoryA
CopyFileA
DeleteFileA
MoveFileA
GetFileAttributesA
SetFileAttributesA
FindClose
FindFirstFileA
GetTempPathA
GlobalUnlock
GlobalLock
GlobalAlloc
ExpandEnvironmentStringsA
Sleep
CreateEventA
CreateThread
WritePrivateProfileStringA
GetVersionExA
LoadLibraryA
FreeLibrary
GetFullPathNameA
HeapAlloc
GetProcessHeap
HeapReAlloc
VirtualProtect
GetModuleFileNameA
ExitProcess
ole32
StringFromGUID2
CLSIDFromString
CreateStreamOnHGlobal
CLSIDFromString
OleUninitialize
CoCreateInstance
OleInitialize
imm32
ImmGetContext
ImmGetCompositionStringA
ImmSetCompositionWindow
ImmReleaseContext
shell32
ShellExecuteA
SHAppBarMessage
DragAcceptFiles
DragFinish
DragQueryFileA
Shell_NotifyIconA
ShellExecuteA
SHGetSpecialFolderPathA
winspool.drv
DocumentPropertiesA
OpenPrinterA
ClosePrinter
ClosePrinter
DocumentPropertiesA
OpenPrinterA
advapi32
RegCloseKey
RegCreateKeyExA
RegSetValueExA
RegOpenKeyExA
RegQueryValueExA
RegOpenKeyExA
RegSetValueExA
RegCreateKeyA
RegDeleteValueA
RegDeleteKeyA
RegQueryValueA
RegCreateKeyExA
RegEnumKeyA
RegOpenKeyA
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
RegCloseKey
comctl32
ord17
ImageList_Add
ImageList_BeginDrag
ImageList_Create
ImageList_Destroy
ImageList_DragEnter
ImageList_DragLeave
ImageList_DragMove
ImageList_DragShowNolock
ImageList_EndDrag
ord17
shlwapi
PathFileExistsA
winmm
PlaySoundA
waveOutUnprepareHeader
waveOutPrepareHeader
waveOutWrite
waveOutPause
waveOutReset
waveOutClose
waveOutGetNumDevs
waveOutOpen
midiOutUnprepareHeader
midiStreamOpen
midiStreamProperty
midiOutPrepareHeader
midiStreamOut
midiStreamStop
midiOutReset
midiStreamClose
midiStreamRestart
ws2_32
recvfrom
ioctlsocket
connect
recv
getpeername
htonl
bind
htons
WSAAsyncSelect
closesocket
send
select
WSACleanup
WSAStartup
gethostbyname
inet_ntoa
inet_addr
accept
ntohs
socket
rasapi32
RasHangUpA
RasGetConnectStatusA
oleaut32
LoadTypeLi
RegisterTypeLi
UnRegisterTypeLi
wininet
InternetCloseHandle
comdlg32
GetFileTitleA
GetSaveFileNameA
ChooseColorA
GetOpenFileNameA
Sections
.text Size: - Virtual size: 2.7MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 1.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 1.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vmp0 Size: - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: 1.5MB - Virtual size: 1.5MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 52B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ