Behavioral task
behavioral1
Sample
0df0304f869f20931dfc3459919f696f_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0df0304f869f20931dfc3459919f696f_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
0df0304f869f20931dfc3459919f696f_JaffaCakes118
-
Size
24KB
-
MD5
0df0304f869f20931dfc3459919f696f
-
SHA1
caa7afe8121adae73182ddcb32ccd898809f063a
-
SHA256
94a595d1c574673ff26d628b0186e635cfac495a4d1369d3b24ff2eb0fc8844e
-
SHA512
74f291aa89493ad20603e313112ec232eee1fef71ff408d727723bf53213ce49f8ae863a4a2545d958c1e23369378fd5de899e0dc99091f262fa30056b192a51
-
SSDEEP
384:mYCNI0Nb/bmQzH/TB1jCo28CVWHY5IkpqkDZzsZVy1Dy/aIB/B9o:mY1cTnTmACVWaplVG6waIB/Be
Malware Config
Signatures
-
resource yara_rule sample vmprotect -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0df0304f869f20931dfc3459919f696f_JaffaCakes118
Files
-
0df0304f869f20931dfc3459919f696f_JaffaCakes118.exe windows:4 windows x86 arch:x86
92b6fae7ecea25db8e47e4c3a68464d2
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ws2_32
WSASocketA
setsockopt
htonl
sendto
inet_addr
gethostbyname
recv
WSACleanup
WSAGetLastError
closesocket
WSAStartup
socket
htons
connect
send
WSAAsyncSelect
kernel32
FreeLibrary
LocalFree
MapViewOfFile
CloseHandle
UnmapViewOfFile
GetCurrentProcess
GetVersionExA
GetTickCount
CopyFileA
GetSystemDirectoryA
GetModuleHandleA
SetFileTime
CreateFileMappingA
CreateFileA
GetFileTime
LoadLibraryA
GetFileAttributesA
FindClose
FindNextFileA
FindFirstFileA
GetDriveTypeA
GetLastError
CreateMutexA
DeleteFileA
ExitProcess
GetModuleFileNameA
SetPriorityClass
Process32Next
Process32First
CreateToolhelp32Snapshot
CreateThread
WriteFile
Sleep
ResumeThread
CreateProcessA
ExpandEnvironmentStringsA
GetTempPathA
MoveFileA
GlobalMemoryStatus
GetComputerNameA
GetCurrentProcessId
HeapAlloc
GetProcAddress
GetStartupInfoA
GetCommandLineA
SetFileAttributesA
GetProcessHeap
VirtualProtect
user32
wsprintfA
DefWindowProcA
ExitWindowsEx
PostQuitMessage
RegisterClassA
CreateWindowExA
ShowWindow
UpdateWindow
SendMessageA
GetMessageA
TranslateMessage
DispatchMessageA
advapi32
OpenServiceA
ChangeServiceConfigA
StartServiceA
OpenSCManagerA
SetSecurityInfo
SetEntriesInAclA
QueryServiceStatus
ControlService
CloseServiceHandle
RegOpenKeyExA
RegRestoreKeyA
RegisterServiceCtrlHandlerA
SetServiceStatus
StartServiceCtrlDispatcherA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
GetSecurityInfo
msvcp60
??1_Winit@std@@QAE@XZ
??0_Winit@std@@QAE@XZ
??1Init@ios_base@std@@QAE@XZ
??0Init@ios_base@std@@QAE@XZ
msvcrt
sprintf
memmove
_stricmp
strstr
_itoa
srand
rand
fopen
atoi
strncpy
strcspn
__CxxFrameHandler
printf
fprintf
malloc
_strlwr
fclose
Sections
.text Size: - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp1 Size: 22KB - Virtual size: 21KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1024B - Virtual size: 536B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ