Behavioral task
behavioral1
Sample
18db4def8cf842a587434c88a510ff5c_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
18db4def8cf842a587434c88a510ff5c_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
18db4def8cf842a587434c88a510ff5c_JaffaCakes118
-
Size
125KB
-
MD5
18db4def8cf842a587434c88a510ff5c
-
SHA1
8f07103541ae2a31155aa30ded4e095fac9d4f86
-
SHA256
951ef36043f2a9addaf729c12f13a4a54b3f05f7920bd6355baee812a180834e
-
SHA512
3822e009094340f3d2ce0395ec4ef617eb3a84d0f67c5c68fc19a96717262f92ee6e678b3a8857a05e6ba37a226f05eba3efbec207f3d9501dd3ffad91280259
-
SSDEEP
3072:5gKMVt2OKlYXRNJgFvpRRUULR6pgHk+CR2F7swhTQrgFG:qz6GRP4BRRUULR6pgHBgrgFG
Malware Config
Signatures
-
resource yara_rule sample vmprotect -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 18db4def8cf842a587434c88a510ff5c_JaffaCakes118
Files
-
18db4def8cf842a587434c88a510ff5c_JaffaCakes118.exe windows:4 windows x86 arch:x86
d88a5f8523a08a1dfcb014830db4d883
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateThread
WinExec
GetCurrentThreadId
Sleep
GetStartupInfoA
GetCommandLineA
CreateMutexA
ReleaseMutex
SetUnhandledExceptionFilter
CreateDirectoryA
SetFilePointer
ReadFile
GetLastError
GetTempPathA
FreeLibrary
LoadLibraryA
GetProcAddress
lstrcatA
DeleteFileA
SetLastError
lstrcpyA
FindResourceA
LoadResource
CreateFileA
SystemTimeToFileTime
GetWindowsDirectoryA
LocalFileTimeToFileTime
SetFileTime
SizeofResource
lstrlenA
GetCurrentProcess
MultiByteToWideChar
CreateToolhelp32Snapshot
Process32First
Process32Next
lstrcmpiA
CloseHandle
GetModuleHandleA
ExitProcess
VirtualProtect
GetModuleFileNameA
ExitProcess
user32
PostQuitMessage
DefWindowProcA
DispatchMessageA
TranslateMessage
GetMessageA
UpdateWindow
ShowWindow
CreateWindowExA
wsprintfA
RegisterClassExA
LoadCursorA
LoadIconA
MessageBoxA
advapi32
RegSaveKeyA
LookupAccountNameA
GetFileSecurityA
InitializeSecurityDescriptor
GetSecurityDescriptorDacl
GetAclInformation
GetLengthSid
InitializeAcl
GetAce
EqualSid
AddAccessAllowedAce
SetSecurityDescriptorDacl
SetFileSecurityA
RegOpenKeyExA
RegCloseKey
RegCreateKeyExA
RegRestoreKeyA
RegQueryValueExA
RegSetValueExA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
CreateServiceA
OpenSCManagerA
StartServiceA
OpenServiceA
RegDeleteKeyA
RegDeleteValueA
CloseServiceHandle
msvcrt
_strrev
_strnset
_strcmpi
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
strtok
memset
??2@YAPAXI@Z
memcpy
strchr
_except_handler3
__CxxFrameHandler
strlen
??3@YAXPAX@Z
strstr
realloc
malloc
??1type_info@@UAE@XZ
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
Sections
.data Size: - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6KB - Virtual size: 114KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vmp0 Size: - Virtual size: 48KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: 118KB - Virtual size: 117KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 52B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ