Behavioral task
behavioral1
Sample
5f971650f239db713b826cf315c591e9_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
5f971650f239db713b826cf315c591e9_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
5f971650f239db713b826cf315c591e9_JaffaCakes118
-
Size
42KB
-
MD5
5f971650f239db713b826cf315c591e9
-
SHA1
90994fa535094866d4f417cbe6f8c1f90999b136
-
SHA256
3a61b7c7b73abf92c689045c47ccdb6472e0be386f75a41333945779b806eeca
-
SHA512
92f54b8d745bd6b661721d670be7d19015b86688e3fd61ba4e16bd2f0086adca5afca0ff4047f5f155b23b744a8cd5d14fc7563b37c155386214f8faeb83a554
-
SSDEEP
768:GkCNYlmNsHdC3pIVdeNR0ntV0KoWzYmaeuLCCEOl/9nGqIJoRIY+t43sGqaX5R3N:G659C3SdORY70KoWzYmYGCZJyhPRaXf9
Malware Config
Signatures
-
resource yara_rule sample vmprotect -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5f971650f239db713b826cf315c591e9_JaffaCakes118
Files
-
5f971650f239db713b826cf315c591e9_JaffaCakes118.exe windows:4 windows x86 arch:x86
cfb3a43b2b2c3f6072d91f157b8c350e
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateFileA
LoadResource
FindResourceA
SetFileTime
GetFileTime
ResumeThread
SetThreadContext
WriteProcessMemory
VirtualAllocEx
GetProcAddress
GetModuleHandleW
GetModuleFileNameW
GetThreadContext
CreateProcessW
OpenProcess
GetCurrentProcessId
HeapFree
SizeofResource
CreateDirectoryA
GetFileAttributesA
lstrcpyA
HeapAlloc
GetProcessHeap
lstrlenA
CreateProcessA
MoveFileExA
MoveFileA
GetTickCount
DeleteFileA
Sleep
SetEvent
CreateEventA
ExpandEnvironmentStringsA
lstrcatA
GetSystemDirectoryA
WriteFile
CloseHandle
GetLastError
FreeResource
RtlUnwind
VirtualProtect
GetModuleFileNameA
ExitProcess
user32
CharNextA
wsprintfA
MessageBoxA
advapi32
RegCloseKey
RegOpenKeyExA
RegSetValueExA
Sections
.text Size: - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vmp0 Size: - Virtual size: 14KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: 40KB - Virtual size: 40KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 100B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ