Runed
Behavioral task
behavioral1
Sample
65216d574c19cdbc03057203a5004c02_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
65216d574c19cdbc03057203a5004c02_JaffaCakes118.dll
Resource
win10v2004-20240704-en
General
-
Target
65216d574c19cdbc03057203a5004c02_JaffaCakes118
-
Size
44KB
-
MD5
65216d574c19cdbc03057203a5004c02
-
SHA1
2b788a055f5959d275bcd6afd5b181e2d8627e52
-
SHA256
d0faac6f3175264d7bf8e1e047571fa669d134d657c0fdbc30b7d94c52c3ef64
-
SHA512
41b92e69d120394f49d0ea03d9a362fb009154effb50f81823fd19004e2b5abad43322fc8b69bf43ec26d3057db065c2ada7c382a5294f9dd61addc413ef5e49
-
SSDEEP
768:B5hLegOdN/ppeOqyc0u5A9snMMHZx+P4TWocZUYban3vzaHqJP:l6gOmOqyc0uYUMMHPtvcuKk3LaK
Malware Config
Signatures
-
resource yara_rule sample vmprotect -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 65216d574c19cdbc03057203a5004c02_JaffaCakes118
Files
-
65216d574c19cdbc03057203a5004c02_JaffaCakes118.dll windows:4 windows x86 arch:x86
d93ce02e65aab131a0b7666fd0534cc9
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
msvcrt
strrchr
_strlwr
??2@YAPAXI@Z
_mbscmp
free
fclose
??3@YAXPAX@Z
fseek
fopen
fread
malloc
_stat
mbstowcs
__CxxFrameHandler
strstr
sprintf
strtol
_mbsrchr
??1type_info@@UAE@XZ
_onexit
__dllonexit
_strupr
mfc42
ord4204
ord5683
ord5710
ord858
ord941
ord939
ord537
ord2818
ord389
ord3229
ord690
ord5204
ord1074
ord6881
ord354
ord5186
ord5442
ord1979
ord665
ord6657
ord5356
ord2393
ord1988
ord540
ord860
ord800
ord269
ord826
ord600
ord1578
ord6467
ord1243
ord1176
kernel32
LocalFree
LocalAlloc
GetFileSize
CreateFileMappingA
MapViewOfFile
UnmapViewOfFile
CreateProcessA
SetEndOfFile
GetShortPathNameA
GetTempPathA
GetSystemDirectoryA
GlobalLock
CreateFileA
WriteFile
GlobalUnlock
GlobalFree
GlobalAlloc
FindFirstFileA
FindClose
CloseHandle
WriteProcessMemory
OpenProcess
TerminateProcess
lstrcpyA
CreateThread
WritePrivateProfileStringA
GetPrivateProfileStringA
Sleep
GetModuleHandleA
DeleteFileA
GetCommandLineA
GetProcAddress
GetModuleFileNameA
GetWindowsDirectoryA
GetCurrentProcess
GetCurrentProcessId
MoveFileA
GetTempFileNameA
LoadLibraryA
user32
GetDesktopWindow
ToAscii
GetWindowDC
GetWindowRect
wsprintfA
GetKeyboardState
MapVirtualKeyA
GetActiveWindow
GetForegroundWindow
ReleaseDC
GetDC
gdi32
BitBlt
SelectObject
DeleteDC
CreateCompatibleDC
GetDIBits
GetObjectA
GetStockObject
SelectPalette
RealizePalette
CreateCompatibleBitmap
comdlg32
GetFileTitleA
advapi32
RegSetValueExA
RegCloseKey
RegCreateKeyExA
shell32
StrCmpNIA
StrStrA
msvcp60
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?_Xlen@std@@YAXXZ
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
shlwapi
PathFileExistsA
iphlpapi
GetAdaptersInfo
Exports
Exports
Sections
.text Size: 15KB - Virtual size: 14KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ