Behavioral task
behavioral1
Sample
61b81b6a2d39b83d6c6b5bc843a88218_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
61b81b6a2d39b83d6c6b5bc843a88218_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
61b81b6a2d39b83d6c6b5bc843a88218_JaffaCakes118
-
Size
68KB
-
MD5
61b81b6a2d39b83d6c6b5bc843a88218
-
SHA1
bcc3e92eeceaaf2d599c5ba99a1b6f64f76311c9
-
SHA256
59f951b8794cf3cb634e3bb747e095ab4f0a3762e2a4c77e9a6078e7a821676f
-
SHA512
3155df76dfaa29ae33b63c32f1e12d1ce3eb328bf9d2ec7fe9d7abce268495cbdab18472b8f531b63c52b32495557d375dbe40a6d66c83fe2be7bd1b15cd490b
-
SSDEEP
1536:KGgJJ6M7AtYRgtUjRlZlWrVFWWJ6lROYnf9xV/NAxEL:KGgJv7G/6KfJ6lRO81W
Malware Config
Signatures
-
resource yara_rule sample vmprotect -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 61b81b6a2d39b83d6c6b5bc843a88218_JaffaCakes118
Files
-
61b81b6a2d39b83d6c6b5bc843a88218_JaffaCakes118.exe windows:4 windows x86 arch:x86
261a9ca797a17a5607e472f0e92910af
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrcmpA
ResumeThread
SetThreadPriority
GetCurrentThread
SetPriorityClass
lstrcatA
GetEnvironmentVariableA
WinExec
GetModuleFileNameA
lstrlenA
GetLastError
CopyFileA
GetSystemDirectoryA
CompareStringW
CompareStringA
CloseHandle
GlobalMemoryStatus
GetComputerNameA
GetCurrentProcess
GetTempPathA
DeleteFileA
ExitProcess
lstrcpyA
CreateProcessA
TerminateProcess
CreateThread
LoadLibraryA
GetProcAddress
FreeLibrary
Sleep
ExitThread
GetShortPathNameA
GetTickCount
GetStringTypeW
GetStringTypeA
LCMapStringW
SetEnvironmentVariableA
LCMapStringA
MultiByteToWideChar
SetStdHandle
FlushFileBuffers
GetOEMCP
GetACP
GetCPInfo
SetFilePointer
WriteFile
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
WideCharToMultiByte
GetTimeZoneInformation
GetSystemTime
GetLocalTime
HeapAlloc
RtlUnwind
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
HeapDestroy
HeapCreate
VirtualFree
HeapFree
VirtualAlloc
HeapReAlloc
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
VirtualProtect
GetModuleFileNameA
ExitProcess
user32
wsprintfA
ExitWindowsEx
MessageBoxA
advapi32
StartServiceA
RegOpenKeyA
RegSetValueExA
CloseServiceHandle
StartServiceCtrlDispatcherA
RegisterServiceCtrlHandlerA
SetServiceStatus
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
LookupPrivilegeValueA
AdjustTokenPrivileges
OpenProcessToken
OpenSCManagerA
OpenServiceA
DeleteService
CreateServiceA
shell32
ShellExecuteA
ws2_32
gethostbyname
inet_ntoa
send
connect
closesocket
recv
WSASocketA
setsockopt
htons
inet_addr
sendto
WSACleanup
WSAStartup
WSAGetLastError
socket
htonl
Sections
.text Size: - Virtual size: 46KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: 60KB - Virtual size: 58KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 56B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ