Behavioral task
behavioral1
Sample
8670c898fcfd9da31d6e79c144236f89_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
8670c898fcfd9da31d6e79c144236f89_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
8670c898fcfd9da31d6e79c144236f89_JaffaCakes118
-
Size
205KB
-
MD5
8670c898fcfd9da31d6e79c144236f89
-
SHA1
a227cc9672d3ead5a964e03c6322a9af4abf4662
-
SHA256
59e254b2486f2c6df7998b2ae5a4e8f08aa74cbe8334b83854db137c6d6d8e87
-
SHA512
89d0693fbd6ae44cd8df5de96247786f0c9bdd7346bef811398f782f1683c33d231a680aff54c8c972d8a6743ef445ad3e1d719ce4e79a3041225cab1623efdf
-
SSDEEP
3072:AMo+SuFjVsFEzrq5sCcSG035jtk5bpx3Lnfv3BPJTB5pLg86t8V1aPD+8+qv3SH9:AM2uz4E/tWPk13f/dXLg8rVcZ3kSZ/
Malware Config
Signatures
-
resource yara_rule sample vmprotect -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8670c898fcfd9da31d6e79c144236f89_JaffaCakes118
Files
-
8670c898fcfd9da31d6e79c144236f89_JaffaCakes118.exe windows:4 windows x86 arch:x86
1e8de184f3654c52699d9c6dfffe9d45
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapAlloc
GetModuleHandleA
GetProcAddress
VirtualProtect
msvcrt
_exit
user32
MessageBoxA
Sections
.text Size: - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: - Virtual size: 768B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: - Virtual size: 159KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 524B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp1 Size: 203KB - Virtual size: 202KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 88B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ