Behavioral task
behavioral1
Sample
1579df78ff02234d82a4e925eceb911d_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1579df78ff02234d82a4e925eceb911d_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
1579df78ff02234d82a4e925eceb911d_JaffaCakes118
-
Size
301KB
-
MD5
1579df78ff02234d82a4e925eceb911d
-
SHA1
5180dd26e8c4c69f608c5975d2e4f46466009689
-
SHA256
d13978276ce308fd24f4197ede67c6ede55c74fba0ee56991e27c9d28d413da8
-
SHA512
dcaf4ab038756dfb7887a35fd3f40f4a86c80cdde767ea956d9afc117ceb68012a54250d4eb24244dea9d9e8cdc1d80bc92b54716095f5f804a893ce3fe16904
-
SSDEEP
6144:IthpoGCBlhsXlMWzD2SMXYImGgr2EO+uxmzHeBHit:ItjcalzzD2jmGH+9zHeBH4
Malware Config
Signatures
-
resource yara_rule sample vmprotect -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1579df78ff02234d82a4e925eceb911d_JaffaCakes118
Files
-
1579df78ff02234d82a4e925eceb911d_JaffaCakes118.exe windows:5 windows x86 arch:x86
5654ed2790b8e06c70d8bcf449e694e3
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comdlg32
PageSetupDlgW
shell32
DragFinish
winspool.drv
GetPrinterDriverW
comctl32
CreateStatusWindowW
msvcrt
_XcptFilter
advapi32
RegQueryValueExW
kernel32
GetCurrentThreadId
LoadLibraryA
VirtualProtect
GetModuleFileNameA
gdi32
EndPage
user32
GetClientRect
MessageBoxA
Sections
.text Size: - Virtual size: 29KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 27KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vmp0 Size: - Virtual size: 238KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp1 Size: 272KB - Virtual size: 272KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE