Z'o�����<����^�$�v�=�{�܀G��E����h.x��cCy�3����̻b��4�=S�����!0�fZ,_��f'������~`���0p�l$l��E(���f�R��%u�AK��9H���У�v��B���t�P�\F=\1��%�ϋ���pJ��m7����%}�A����Un�^�&x���k1���݄�o���|���V��HQ��y"Ρ!�N���N�G�[r`��;F��d���)��2_����P����Q�x����Ek�f�h�끒�_#�{����_W�N�p����H�$Gk:i4��������n�恌<�c�]o�i��oJ3��,\��ڞ��ќt-�/ڣ;Z�Vp)I����o;gz{Ԣ�ڼZ�{�y��S��5f���O��yR[�>���K|����*f)���^�ZF+�J$u���>,}m}��l��>e� LW��u��a1Ψ����8\�h`ln1X����p��6��3�������\?#��85�U�Q��!R�&|�i�n��c��r��<'g2qDL'�34���3���k�V�y�����[�s7`��S�?M0Z(Wu?���5K1�����S)t��Hpˏ �r�Vb7E )��8v�Yn4Wh�ͩ��4�'�-�DX+���7����h \H!��K�l}�h��$h�Z�����[@u���0^�I7CJ��,أ�%�d����Te�κ&�����?������=��p�QK0��7�m����=��ԣ�me���C��1��U���� ��v���k��;z��7k�Z�����^�ڵ���߱�j�\2�D�X� �����$]�<�2<;5@,v="�IE�{�9�\���jgf�Lg2e�dE��������zz|� ��%�� e����)j�Hꆘ��V4|9 )C��c}�?.��jJ[c*�=>��;�EƙZ��Q�zzv���p4�Xr��x�����e�H������6�~����0�68\_�:Q�kx�� ��j]�2<�^[ctUWL���Q��.4�� �Ýd�{��Z!{��m#PN������~��Ѡ'�ׁ�N�?���si:��=�ʛ�VV�g��Ǣ���Q���?�!h*��^��~4˱�<�**f-��v�Tš��ܧ`�m�ߚ����X�I�����4�Ǹ�cj�E����'0e��P���akmW5$Vg:����5����@�?���Y�}��J����/���n0�Ϋh�|�Է [�L2�AB@m<9��8.�Ϣb�|kX�k�$}�X��\tl�c8��$��rVVD����#��T�b�t���-��C4�Wك�� ƉJ����8J�s� �R���0f7� ���C���H06��l]��z�o7����T�bF���Bɵ I �����`�n�G��� ��'!eZ���>l9�)�~�O*M�P��{z������>A��9�֕�]�L�#�/N����H���ŏv�AZ����^$e���<�[nٙt�қng�ޤLA��dD+AG,���`�rз��)*i9�Z]U^�hm�]�M����?��6�f<�+T��܁Q��X�[���1 b8�e���[�}7�|�Н��Q�0GR^k�ۋ{l3��Lj�7p?ܿ� GEN�`����A3�3������l��;�K�]��viAf�U;Bo�?�دX�8[����7V�����/��.�\�eIf�缾��ן�z4 �*>2�(�:#r�%OM�BMoz�SX��\�`±X�'L�)�c��B��^�Ý�| ��O'DT�Ζ��8t=���V?�)�>\��3k�'�35[����"Rh���,A �M3:�MO���{��*�p:�g�Y�:������Yq�ԕj*�]6k�V՜���0,g}ށ6#M���V�X_bو�Q��}Z���Hk��?��Ͷ���w�z��v�9���6?Elu߫���f _1��<]���V�s�}�]3�%��3�o���*:��wa0o��r[�"B"Q�[� �A����G�/�����.���9'�;�� �-���½!�?�n͊�gj7L��ּ�i$�:`��z"{�=�Ͳ���9͡�j=����k��fJ�;���L��� � �h̏ud1�l!����W�����O� R��\N)�0�QW+$ѴC�������Q����R�Lxzx��e�{���w��}�.p��C�SOUI?[��U<w"����Jll����j�u4n�}�b�Q�����Mc��$i�=�)�z�uŏ��r���1"Al�d��b'd�36O����J�:ZQ�B(�ӷ���?6�M�zIƴ!�]�(�s=&%0����2����z�R� [���X|����X�X���@a�����y��F��2��*J�i&Dn?���g����pXo�&���X �H�$�v�'�#���9�1��x�XN�a�0^�j����-o='D3Hү��b��B�-�v��(����S�C�U�ŇH�gC��ll�����I�P��y�� ��ZN3[=.�>x�@6�w�,R���.����k�0^:�\������>�L���BP/H���c�ֺ_BP���YzN/�Z�s$�пP�b['��)2� �.;����A�����t����W�v`eEo�������5���{�ɌBd\�^��7����#?����&$:4�[?�Y�Α���"����H���m�_b�u1�#��T���T�������� ����r�?�N��C:Kd���V���~�[�5�'J���>��g����4�oCm�~�8��qpୠU�@O���^Yv ��j�C����$R��J��l>]�?�)!���T&sj���Zɜ��DcT���+x���m��.�^6��-���CHĖ����cN(߷�lP���) ���{S�O��}�����~W#F�}?b��4�>z5�:8A�#Ù��ul�0�=~,Q���5�R"�ެ�����L7-�:k� ��_���Y���[KB�S��\j]�7�խ=�]����C�`&g��+r�� ���z͂�X:�}�'����|h��ylp=�@n�涛�1���°�ż���gH.h}�������w5���d�x�
Behavioral task
behavioral1
Sample
29f8ca8b8acf09332c23ac3d14b7993c_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
29f8ca8b8acf09332c23ac3d14b7993c_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
29f8ca8b8acf09332c23ac3d14b7993c_JaffaCakes118
-
Size
776KB
-
MD5
29f8ca8b8acf09332c23ac3d14b7993c
-
SHA1
d26c67337c1d80a192bb63c1699eeab98a760bee
-
SHA256
2ace1179a3147ac0a453d105074f121675dd6372d68281e9b4eda85f79d6df92
-
SHA512
ffbc3cc98ae3913a0612e12099a9a4f56c78a836b139d37f0357fbb69afcc780196cb02f28839dfcb31a866efc21b6ceae2691db9626adcaa01067f576e60598
-
SSDEEP
12288:L/axgxHRCulkWNUV1tOYXJUphIZ6n3IX0jmF0APKrEQWsWyWMy5XoSCusi3PZjq:Lqgxx7lJNOtOGSI4IX90zEQrWFM+48t
Malware Config
Signatures
-
resource yara_rule sample vmprotect -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 29f8ca8b8acf09332c23ac3d14b7993c_JaffaCakes118
Files
-
29f8ca8b8acf09332c23ac3d14b7993c_JaffaCakes118.exe windows:4 windows x86 arch:x86
bc9583c4652f7e7bf9105ed97d14f397
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetErrorMode
GetTickCount
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
RtlUnwind
GetSystemTimeAsFileTime
GetStartupInfoA
GetCommandLineA
HeapReAlloc
SetStdHandle
GetFileType
HeapSize
HeapDestroy
HeapCreate
VirtualFree
IsBadWritePtr
QueryPerformanceCounter
LCMapStringA
SetUnhandledExceptionFilter
GetStringTypeA
GetStringTypeW
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetTimeZoneInformation
IsBadReadPtr
IsBadCodePtr
SetEnvironmentVariableA
GetFileTime
GetFileAttributesA
CreateFileA
GetFullPathNameA
GetVolumeInformationA
FindFirstFileA
FindClose
GetCurrentProcess
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
GetOEMCP
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
TlsGetValue
GlobalHandle
GlobalReAlloc
InterlockedIncrement
GlobalFlags
LocalAlloc
FileTimeToLocalFileTime
FileTimeToSystemTime
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesA
lstrcmpA
RaiseException
FreeResource
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
lstrcmpW
GetCurrentThreadId
InterlockedDecrement
SetLastError
GlobalFree
MulDiv
GlobalAlloc
GlobalLock
GlobalUnlock
FormatMessageA
lstrcpynA
LocalFree
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
GetProcessHeap
HeapAlloc
HeapFree
CreateFileMappingA
MapViewOfFile
UnmapViewOfFile
GetPrivateProfileStringA
WritePrivateProfileStringA
GetWindowsDirectoryA
LoadLibraryA
FreeLibrary
lstrcatA
WinExec
lstrcpyA
Sleep
CreateProcessA
WaitForSingleObject
GetModuleHandleA
GetProcAddress
VirtualAllocEx
WriteProcessMemory
ExitProcess
GetSystemDirectoryA
CreateThread
GetModuleFileNameA
GetCurrentProcessId
OpenProcess
TerminateProcess
Process32First
Process32Next
CreateToolhelp32Snapshot
CloseHandle
CompareStringW
CompareStringA
GetCPInfo
lstrlenA
lstrlenW
lstrcmpiA
GetVersion
FindResourceA
LoadResource
LockResource
SizeofResource
GetLastError
WideCharToMultiByte
MultiByteToWideChar
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
LCMapStringW
GetModuleHandleA
LoadLibraryA
VirtualAlloc
VirtualFree
GetModuleFileNameA
ExitProcess
user32
PostThreadMessageA
LoadMenuA
UnpackDDElParam
ReuseDDElParam
LoadAcceleratorsA
InsertMenuItemA
BringWindowToTop
SetMenu
TranslateAcceleratorA
ReleaseCapture
SetCapture
SetWindowRgn
IsRectEmpty
SetWindowContextHelpId
MapDialogRect
ShowOwnedPopups
PostQuitMessage
CreateDialogIndirectParamA
EndDialog
EnableMenuItem
CheckMenuItem
GetMenuCheckMarkDimensions
IsWindowEnabled
ShowWindow
MoveWindow
SetWindowTextA
IsDialogMessageA
SetRectEmpty
RegisterWindowMessageA
WinHelpA
GetCapture
CreateWindowExA
GetClassLongA
GetClassInfoExA
GetClassNameA
SetPropA
GetPropA
RemovePropA
SendDlgItemMessageA
GetFocus
SetFocus
IsChild
GetWindowTextLengthA
GetWindowTextA
GetForegroundWindow
GetLastActivePopup
SetActiveWindow
BeginDeferWindowPos
EndDeferWindowPos
GetDlgItem
GetTopWindow
DestroyWindow
GetMessageTime
MapWindowPoints
ScrollWindow
TrackPopupMenu
SetScrollRange
GetScrollRange
SetScrollPos
GetScrollPos
ShowScrollBar
UpdateWindow
GetMenu
AdjustWindowRectEx
EqualRect
DeferWindowPos
RegisterClipboardFormatA
SetScrollInfo
RegisterClassA
UnregisterClassA
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
SetWindowPos
IntersectRect
GetWindowPlacement
GetWindow
EndPaint
BeginPaint
GetWindowDC
SetWindowsHookExA
CallNextHookEx
GetMessageA
TranslateMessage
DispatchMessageA
IsWindowVisible
GetKeyState
PeekMessageA
GetCursorPos
ValidateRect
UnhookWindowsHookEx
GetMenuStringA
DestroyMenu
wsprintfA
MessageBeep
SetWindowLongA
LoadCursorA
CopyIcon
IsWindow
GetMessagePos
ScreenToClient
PtInRect
FindWindowA
SetForegroundWindow
LoadIconA
KillTimer
SetTimer
IsIconic
GetSystemMenu
DrawIcon
MessageBoxA
DestroyCursor
PostMessageA
SetCursor
IsMenu
GetWindowLongA
WindowFromPoint
GetParent
GetNextDlgTabItem
GetActiveWindow
InvalidateRect
ClientToScreen
GetClientRect
SetParent
GetNextDlgGroupItem
InvalidateRgn
CopyAcceleratorTableA
GetWindowRect
SendMessageA
DrawFocusRect
FrameRect
OffsetRect
InflateRect
DrawStateA
GetMenuItemInfoA
GetSystemMetrics
SystemParametersInfoA
GetSysColorBrush
GetSysColor
DrawIconEx
DestroyIcon
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
CharNextA
LockWindowUpdate
GetScrollInfo
GetDCEx
EnableWindow
GetDesktopWindow
ReleaseDC
GetDC
ModifyMenuA
GetSubMenu
GetMenuState
GetMenuItemID
GetMenuItemCount
AppendMenuA
CreatePopupMenu
CreateMenu
DrawEdge
FillRect
LoadBitmapA
CopyRect
SetRect
CharUpperA
GetClassInfoA
SetMenuItemBitmaps
gdi32
StretchDIBits
GetCharWidthA
CreateFontA
GetBkColor
CreateRectRgnIndirect
SetRectRgn
CombineRgn
GetMapMode
CreateEllipticRgn
LPtoDP
GetTextColor
GetRgnBox
GetClipBox
SetMapMode
SetBkMode
RestoreDC
SaveDC
CreateBitmap
SetBkColor
SetTextColor
GetStockObject
ExcludeClipRect
CreatePatternBrush
ExtSelectClipRgn
ScaleWindowExtEx
SetWindowExtEx
SetWindowOrgEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
GetWindowExtEx
GetViewportExtEx
CreateRectRgn
SelectClipRgn
MoveToEx
LineTo
CreateSolidBrush
CreatePen
GetTextExtentPoint32W
CreateDIBSection
SelectObject
DeleteObject
DeleteDC
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetTextExtentPoint32A
SetPixel
GetPixel
BitBlt
PatBlt
Ellipse
GetBkMode
GetDeviceCaps
CreateCompatibleDC
GetObjectA
CreateCompatibleBitmap
CreateFontIndirectA
IntersectClipRect
comdlg32
GetOpenFileNameA
GetFileTitleA
GetSaveFileNameA
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
RegQueryValueExA
RegOpenKeyExA
RegQueryValueA
FreeSid
SetSecurityDescriptorDacl
AddAccessAllowedAce
InitializeAcl
GetLengthSid
AllocateAndInitializeSid
InitializeSecurityDescriptor
RegOpenKeyA
RegDeleteKeyA
RegEnumKeyA
RegCreateKeyExA
RegSetValueExA
RegCloseKey
shell32
ShellExecuteA
DragFinish
DragQueryFileA
ShellExecuteExA
comctl32
ImageList_GetImageCount
ImageList_AddMasked
ImageList_ReplaceIcon
ImageList_GetIcon
ImageList_Draw
_TrackMouseEvent
ord17
ImageList_Destroy
ImageList_Create
ImageList_GetImageInfo
shlwapi
PathFindFileNameA
UrlUnescapeA
PathStripToRootA
PathFindExtensionA
PathIsUNCA
oledlg
ord8
ole32
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoGetClassObject
CLSIDFromString
CLSIDFromProgID
CoTaskMemAlloc
CoTaskMemFree
OleUninitialize
CoFreeUnusedLibraries
OleInitialize
CoRevokeClassObject
OleIsCurrentClipboard
OleFlushClipboard
CoRegisterMessageFilter
oleaut32
VariantChangeType
OleCreateFontIndirect
SysAllocString
SystemTimeToVariantTime
SafeArrayDestroy
VariantCopy
SafeArrayCreate
SafeArrayGetDim
SafeArrayGetElemsize
SafeArrayGetLBound
SafeArrayGetUBound
SafeArrayAccessData
SafeArrayUnaccessData
SysAllocStringByteLen
SysStringLen
SysFreeString
SysAllocStringLen
VariantInit
VariantClear
winmm
PlaySoundA
wininet
InternetReadFile
InternetWriteFile
InternetSetFilePointer
InternetSetStatusCallback
InternetOpenA
InternetGetLastResponseInfoA
InternetCloseHandle
InternetOpenUrlA
InternetQueryDataAvailable
InternetQueryOptionA
InternetCanonicalizeUrlA
InternetCrackUrlA
ws2_32
WSACancelBlockingCall
WSAGetLastError
WSACleanup
WSAStartup
socket
connect
bind
listen
getsockname
ioctlsocket
closesocket
recv
send
select
__WSAFDIsSet
gethostbyname
inet_ntoa
inet_addr
setsockopt
Exports
Exports
Sections
.text Size: 296KB - Virtual size: 294KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 76KB - Virtual size: 73KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vmp0 Size: 292KB - Virtual size: 289KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
.tls Size: 4KB - Virtual size: 24B
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp1 Size: 60KB - Virtual size: 58KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ