Behavioral task
behavioral1
Sample
61aefeb186a7d651741a75ee6b2636e3_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
61aefeb186a7d651741a75ee6b2636e3_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
61aefeb186a7d651741a75ee6b2636e3_JaffaCakes118
-
Size
816KB
-
MD5
61aefeb186a7d651741a75ee6b2636e3
-
SHA1
7a51f65fbfba432d6dd00add0cb2fb42bd9fe243
-
SHA256
46ad52b6de3f236d9497a08ca0517ab266d2d828a878146d51dcb306c0ecaec4
-
SHA512
468148ce50e26de13d248beefb6d46cc5b596aa5fab2b4787c90daa7cee4ecd848de173d6c4e22ccad3f5ca7bab3ed83029c1bce7a279fc28726c01bc6718551
-
SSDEEP
24576:zNvJkZg93eC//fsog+W7xkgKIMJv+oEkeV:zRJkZg93XEogXfdEmVd
Malware Config
Signatures
-
resource yara_rule sample vmprotect -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 61aefeb186a7d651741a75ee6b2636e3_JaffaCakes118
Files
-
61aefeb186a7d651741a75ee6b2636e3_JaffaCakes118.exe windows:4 windows x86 arch:x86
f405fa54584064d04dc06545bb7276d0
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentThread
GetModuleHandleA
LoadLibraryA
LocalAlloc
LocalFree
GetModuleFileNameA
ExitProcess
user32
CheckMenuItem
MessageBoxA
gdi32
ExtTextOutA
winmm
waveOutWrite
winspool.drv
DocumentPropertiesA
advapi32
RegCreateKeyExA
shell32
ShellExecuteA
ole32
OleInitialize
oleaut32
OleCreateFontIndirect
comctl32
ord17
oledlg
ord8
ws2_32
recvfrom
comdlg32
GetFileTitleA
Sections
.text Size: - Virtual size: 490KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 210KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 125KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vmp0 Size: - Virtual size: 313KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
.vmp1 Size: 792KB - Virtual size: 788KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE