Behavioral task
behavioral1
Sample
0f0456ba622e0cd4908293fe1825d858_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0f0456ba622e0cd4908293fe1825d858_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
0f0456ba622e0cd4908293fe1825d858_JaffaCakes118
-
Size
4.3MB
-
MD5
0f0456ba622e0cd4908293fe1825d858
-
SHA1
8556f08c9bb05069321542868ac0f15a5f140c31
-
SHA256
59fa293db06f60b5a05ee48e9a264f49e464dd46ec0de49ae1144b2e021855b7
-
SHA512
632d878611ad6d9a6611108fa51a5743a099150aeb784fc0db669e797fe4999af46ee8dc366c5c74e988b0710cc5721cd52df25f08b688f5a7f617172367f05f
-
SSDEEP
98304:f0WLWTLqcg71BOdkCJho3hI2d8cKxCS7R4SCw:kqcg71U/OI2MxCSmSC
Malware Config
Signatures
-
resource yara_rule sample vmprotect -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0f0456ba622e0cd4908293fe1825d858_JaffaCakes118
Files
-
0f0456ba622e0cd4908293fe1825d858_JaffaCakes118.exe windows:4 windows x86 arch:x86
d413dc263abd7f1a0999161e7fd3aa5a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
ord17
ws2_32
inet_ntoa
psapi
GetModuleFileNameExA
kernel32
GetConsoleCP
GetModuleHandleA
LoadLibraryA
LocalAlloc
LocalFree
GetModuleFileNameA
ExitProcess
user32
EndDialog
shell32
ShellExecuteExA
Sections
.text Size: - Virtual size: 412KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: - Virtual size: 91KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 1.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 350KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vmp0 Size: - Virtual size: 2.5MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 4KB - Virtual size: 24B
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp1 Size: 4.3MB - Virtual size: 4.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE