Behavioral task
behavioral1
Sample
0146786c35032244ad72a869b4c882df_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
0146786c35032244ad72a869b4c882df_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
0146786c35032244ad72a869b4c882df_JaffaCakes118
-
Size
66KB
-
MD5
0146786c35032244ad72a869b4c882df
-
SHA1
43afb3f5cb8e9be18bf43bb2b7bcd04eb78a686a
-
SHA256
c21d74be9e0c84aa35196e9a26a6e90ea29703327cf6fee8f15e072637e45e59
-
SHA512
28cfec3d75bab4d3499f3d5e86dcee4f51210ff5879e84a05d1380663bed4523e88ee87e1ccc1efe87942f0277a5541f7f834bfa406fe15a29cc2c5c6e69d24f
-
SSDEEP
1536:xOuJmYJ3BdW2i8styswxRds6AgwGC244okBM72n4HbkJNDT:xO7YNq8LxI69wx2VoW47kJNDT
Malware Config
Signatures
-
resource yara_rule sample vmprotect -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0146786c35032244ad72a869b4c882df_JaffaCakes118
Files
-
0146786c35032244ad72a869b4c882df_JaffaCakes118.exe windows:4 windows x86 arch:x86
972063e8424423a2b955ee0df0839a29
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualFree
LoadLibraryA
VirtualProtect
GetModuleFileNameA
ExitProcess
user32
MessageBoxA
MessageBoxA
advapi32
RegOpenKeyExA
msvcrt
_ui64toa
shell32
ShellExecuteA
shlwapi
SHDeleteKeyA
ws2_32
WSASocketA
Sections
.data Size: - Virtual size: 52KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ex_cod Size: - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 852B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vmp0 Size: - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_WRITE
.vmp1 Size: 64KB - Virtual size: 63KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 204B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ