Behavioral task
behavioral1
Sample
945a5a683337729516560496168a9756_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
945a5a683337729516560496168a9756_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
945a5a683337729516560496168a9756_JaffaCakes118
-
Size
1010KB
-
MD5
945a5a683337729516560496168a9756
-
SHA1
1abbc21dc2bbebc7b46c4869f04c9cdd267e1faf
-
SHA256
b369f59f838149145ff0ccadc585ecb50816eeec2105d78cfbdcb94495979bd3
-
SHA512
076a22a5b42743e4352c2df226f4e2a802cd3df311e5854d4c88df25fe12aff7857608d533332c35e6c9322213e610bd561aacf517bd00dcf8b881cc68996ed3
-
SSDEEP
12288:OS2XpJxH2dRuAwGgc7fNuIEGpEgcAHJgdLhtaN2oJpaz/g/J/vEnn:OSekuAwj2fNuI1JgdbaNtaz/g/J/In
Malware Config
Signatures
-
resource yara_rule sample vmprotect -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 945a5a683337729516560496168a9756_JaffaCakes118
Files
-
945a5a683337729516560496168a9756_JaffaCakes118.exe windows:4 windows x86 arch:x86
3d5af3e10835df90fd4f17373afe98b3
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FreeResource
WriteFile
SizeofResource
LockResource
LoadResource
FindResourceA
Process32Next
lstrcmpiA
Process32First
CreateToolhelp32Snapshot
ExitProcess
GetModuleFileNameA
WaitForSingleObject
CreateProcessA
CloseHandle
GetTickCount
GetCurrentProcess
MoveFileExA
CreateThread
CopyFileA
GetWindowsDirectoryA
GetLastError
CreateMutexA
CreateFileA
lstrcpyA
GetSystemDirectoryA
lstrcatA
DeviceIoControl
Sleep
DeleteFileA
LoadLibraryA
GetProcAddress
GetTempPathA
FreeLibrary
VirtualProtect
GetModuleFileNameA
ExitProcess
user32
EnumWindows
GetWindowThreadProcessId
RegisterClassA
GetDesktopWindow
CreateWindowExA
SetParent
DestroyWindow
UnregisterClassA
DefWindowProcA
wsprintfA
MessageBoxA
advapi32
CloseServiceHandle
DeleteService
ControlService
OpenServiceA
CreateServiceA
OpenSCManagerA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
StartServiceA
Sections
.data Size: - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vmp0 Size: - Virtual size: 22KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: 68KB - Virtual size: 68KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 108B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ