Behavioral task
behavioral1
Sample
46988044c936a24fc9c1af8624685eaf_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
46988044c936a24fc9c1af8624685eaf_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
46988044c936a24fc9c1af8624685eaf_JaffaCakes118
-
Size
752KB
-
MD5
46988044c936a24fc9c1af8624685eaf
-
SHA1
de7b89342e97e6dab15f4ae9612d818a2b51d1d1
-
SHA256
34aff9a1dbd844110a82d288b9363d566d9862fc22281ca274b3a2c80b3233a3
-
SHA512
59e5ba107271b41c93dd58c37c3e8b8e4ce8e2be08a7d93e29eb877eb879f16d58c6a76d08bb31c04186bc0168793c16d3b2114d976326e56aa48daf630074e4
-
SSDEEP
12288:kCnZ0OcydcZKRRdJYIpjgmaAqFUWzgmeJrGa/NglDS9MrGLTNhe22a/6Cb:kC57lRdGgjgmaAqF0hCaVgA9MrUT/eJS
Malware Config
Signatures
-
resource yara_rule sample vmprotect -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 46988044c936a24fc9c1af8624685eaf_JaffaCakes118
Files
-
46988044c936a24fc9c1af8624685eaf_JaffaCakes118.exe windows:4 windows x86 arch:x86
b629802ab04659d0824a84b0454a586c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvbvm60
__vbaUI1I2
kernel32
CloseHandle
GetModuleFileNameW
GetModuleHandleA
LoadLibraryA
LocalAlloc
LocalFree
GetModuleFileNameA
ExitProcess
user32
CharUpperBuffW
Sections
.text Size: - Virtual size: 117KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: - Virtual size: 719KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp2 Size: 740KB - Virtual size: 737KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ