Behavioral task
behavioral1
Sample
42cb752dae90b91c0a050f137764e1d2_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
42cb752dae90b91c0a050f137764e1d2_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
42cb752dae90b91c0a050f137764e1d2_JaffaCakes118
-
Size
356KB
-
MD5
42cb752dae90b91c0a050f137764e1d2
-
SHA1
7a8ea746afff76a67b7212febebed783f55166df
-
SHA256
477d9408238c4f1af00d98b8008197121b7e4857b2caac9c6bd246b101747119
-
SHA512
8cec5d00bc6468b90b2bd09b2d7f6fbbdfc68b59d068a1c62daa22eafe3fc7e083b4d87e9fc11d71988f7832f1b2727aee75cfd32a4cff8c9945934aa391067d
-
SSDEEP
6144:Bf9tmBEdhfeUrrSmgnMVgVsN2ESsQ7yLnna7k4Q+kBgIZgkbVzgXWLQih:h9tm+GUCmsMWsN21yna7JQ+kBgq7bVMq
Malware Config
Signatures
-
resource yara_rule sample vmprotect -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 42cb752dae90b91c0a050f137764e1d2_JaffaCakes118
Files
-
42cb752dae90b91c0a050f137764e1d2_JaffaCakes118.dll windows:4 windows x86 arch:x86
c5698713d3ff231bacf296a143af13f6
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
WritePrivateProfileStringA
RtlUnwind
GetFileType
HeapFree
HeapAlloc
GetCommandLineA
RaiseException
TerminateProcess
GetTimeZoneInformation
GetSystemTime
GetLocalTime
GetACP
HeapSize
HeapReAlloc
SetStdHandle
SetHandleCount
GetStdHandle
GetStartupInfoA
GetEnvironmentVariableA
GetVersionExA
GetFileTime
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetUnhandledExceptionFilter
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetDriveTypeA
IsBadReadPtr
IsBadCodePtr
CompareStringA
CompareStringW
SetEnvironmentVariableA
GetFileSize
GetFileAttributesA
GetOEMCP
GetCPInfo
GetProcessVersion
GlobalFlags
SetErrorMode
LocalReAlloc
TlsSetValue
EnterCriticalSection
GlobalReAlloc
LeaveCriticalSection
TlsFree
GlobalHandle
DeleteCriticalSection
TlsAlloc
InitializeCriticalSection
LocalAlloc
MulDiv
FileTimeToLocalFileTime
FileTimeToSystemTime
GetFullPathNameA
lstrcpynA
GetVolumeInformationA
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
CreateFileA
DuplicateHandle
FindNextFileA
CloseHandle
GetModuleFileNameA
GlobalAlloc
lstrcmpA
GetCurrentThread
LocalFree
MultiByteToWideChar
WideCharToMultiByte
lstrlenA
InterlockedDecrement
InterlockedIncrement
GetVersion
lstrcatA
GetCurrentThreadId
GlobalGetAtomNameA
lstrcmpiA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
lstrcpyA
GlobalLock
GlobalUnlock
GlobalFree
LockResource
FindResourceA
LoadResource
FlushInstructionCache
GetModuleHandleA
SetLastError
FindFirstFileA
FindClose
GetCurrentProcessId
OpenProcess
VirtualAllocEx
VirtualQuery
ExitProcess
TlsGetValue
OpenFileMappingA
MapViewOfFile
GetLastError
WriteProcessMemory
LoadLibraryA
GetProcAddress
FreeLibrary
GetCurrentProcess
VirtualProtect
ReadProcessMemory
GetCurrentDirectoryA
CreateDirectoryA
CreateThread
Sleep
HeapDestroy
VirtualProtect
GetModuleFileNameA
ExitProcess
user32
GetDC
ClientToScreen
TabbedTextOutA
DrawTextA
GrayStringA
UnregisterClassA
GetClassNameA
LoadCursorA
GetSysColorBrush
DestroyMenu
LoadStringA
LoadIconA
PostMessageA
UpdateWindow
SendDlgItemMessageA
MapWindowPoints
PeekMessageA
DispatchMessageA
SetFocus
AdjustWindowRectEx
MessageBoxA
GetCapture
WinHelpA
GetClassInfoA
RegisterClassA
GetMenu
GetMenuItemCount
GetSubMenu
GetMenuItemID
ReleaseDC
GetWindowTextA
TranslateMessage
GetKeyState
CreateWindowExA
GetClassLongA
SetPropA
UnhookWindowsHookEx
GetPropA
CallWindowProcA
RemovePropA
DefWindowProcA
GetMessageTime
GetLastActivePopup
GetForegroundWindow
SetForegroundWindow
GetWindow
SetWindowLongA
SetWindowPos
RegisterWindowMessageA
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetNextDlgTabItem
EndDialog
GetActiveWindow
SetActiveWindow
IsWindow
CreateDialogIndirectParamA
DestroyWindow
GetParent
GetWindowLongA
GetDlgItem
IsWindowEnabled
InvalidateRect
ScreenToClient
PtInRect
CopyRect
EnableWindow
ValidateRect
SetCursor
PostQuitMessage
WaitMessage
GetSystemMetrics
GetSysColor
GetWindowRect
FindWindowA
KillTimer
SetTimer
IsWindowVisible
wsprintfA
GetAsyncKeyState
CharUpperA
GetMessageA
GetCursorPos
SetCursorPos
GetMessagePos
WindowFromPoint
GetClientRect
ShowCursor
GetKeyNameTextA
GetFocus
CallNextHookEx
SetWindowsHookExA
GetWindowThreadProcessId
SendMessageA
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
ShowWindow
SetWindowTextA
IsDialogMessageA
GetDlgCtrlID
GetTopWindow
MessageBoxA
gdi32
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
DeleteObject
SetMapMode
GetDeviceCaps
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
SetBkMode
GetStockObject
SelectObject
RestoreDC
SaveDC
DeleteDC
CreateBitmap
GetObjectA
SetBkColor
SetTextColor
GetClipBox
GetTextExtentPoint32A
comdlg32
GetFileTitleA
winspool.drv
DocumentPropertiesA
OpenPrinterA
ClosePrinter
advapi32
RegCreateKeyExA
RegOpenKeyExA
RegSetValueExA
RegCloseKey
comctl32
ord17
ImageList_Draw
ImageList_Destroy
ImageList_GetImageInfo
wsock32
inet_ntoa
WSAAsyncSelect
send
recv
closesocket
WSAGetLastError
WSASetLastError
WSAStartup
gethostbyname
inet_addr
WSACleanup
connect
sendto
accept
recvfrom
opengl32
glVertex3fv
glColor4f
glGetFloatv
glBegin
glClear
glClearDepth
glLineWidth
glDisable
glPolygonMode
glTexEnvi
glEnd
glColor3f
glBlendFunc
glEnable
glGetIntegerv
glViewport
glPopMatrix
glFrustum
glMatrixMode
glLoadIdentity
glPushMatrix
glVertex3f
glGetDoublev
glVertex2f
glu32
gluProject
Sections
.text Size: - Virtual size: 179KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 4.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vmp0 Size: - Virtual size: 30KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: - Virtual size: 220KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp2 Size: 344KB - Virtual size: 340KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 116B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ