Behavioral task
behavioral1
Sample
371e042de3dd9689dabe2050bcc48218_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
371e042de3dd9689dabe2050bcc48218_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
371e042de3dd9689dabe2050bcc48218_JaffaCakes118
-
Size
72KB
-
MD5
371e042de3dd9689dabe2050bcc48218
-
SHA1
17303945b49f0155c336b8c0070b5a3d305164fe
-
SHA256
fc6634dbf17ed82baed7dc338debece3e1adbced3b0ff6aea8f7f256168d29af
-
SHA512
d74db3f4b8d721d38cced4bbad6bc7d99f6f61bb88f44a07b87547858f06ce7571622ab5b38575f1628d2c434fa84fe8131515495b9b170a1f887891e59d7774
-
SSDEEP
1536:Am4aUwnBUKAobQz7LOdOW8hdvkle/ehouukZLm/Ou/lz/TNeOJ:F4aUwn+4bO7uOW8hdvm/hZF4/lzLN9
Malware Config
Signatures
-
resource yara_rule sample vmprotect -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 371e042de3dd9689dabe2050bcc48218_JaffaCakes118
Files
-
371e042de3dd9689dabe2050bcc48218_JaffaCakes118.exe windows:4 windows x86 arch:x86
cb95a4fb68ca89f04688f5a28493823d
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindClose
FindFirstFileA
GetVersionExA
ResumeThread
SetThreadPriority
GetCurrentThread
SetPriorityClass
lstrcatA
GetEnvironmentVariableA
WinExec
GetModuleFileNameA
lstrlenA
GetLastError
CopyFileA
GetSystemDirectoryA
CompareStringW
CompareStringA
CloseHandle
SetFileAttributesA
GlobalMemoryStatus
GetComputerNameA
GetTempPathA
DeleteFileA
CreateProcessA
ExitProcess
GetCurrentProcess
lstrcpyA
CreateThread
LoadLibraryA
GetProcAddress
FreeLibrary
Sleep
ExitThread
GetShortPathNameA
GetTickCount
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
MultiByteToWideChar
SetEnvironmentVariableA
SetStdHandle
FlushFileBuffers
GetOEMCP
GetACP
GetCPInfo
SetFilePointer
WriteFile
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
WideCharToMultiByte
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetTimeZoneInformation
GetSystemTime
GetLocalTime
HeapAlloc
TerminateProcess
RtlUnwind
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
HeapDestroy
HeapCreate
VirtualFree
HeapFree
VirtualAlloc
HeapReAlloc
UnhandledExceptionFilter
VirtualProtect
GetModuleFileNameA
ExitProcess
user32
ExitWindowsEx
wsprintfA
MessageBoxA
advapi32
CreateServiceA
OpenServiceA
StartServiceA
RegOpenKeyA
RegSetValueExA
CloseServiceHandle
StartServiceCtrlDispatcherA
RegisterServiceCtrlHandlerA
SetServiceStatus
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
LookupPrivilegeValueA
AdjustTokenPrivileges
OpenProcessToken
OpenSCManagerA
shell32
ShellExecuteA
ws2_32
gethostbyname
inet_ntoa
send
connect
recv
socket
WSASocketA
setsockopt
inet_addr
htonl
sendto
WSACleanup
WSAStartup
WSAGetLastError
closesocket
htons
wininet
DeleteUrlCacheEntry
Sections
.text Size: - Virtual size: 44KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: 64KB - Virtual size: 62KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 108B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ