Behavioral task
behavioral1
Sample
94a6f97b693f9eaece9dd7def93d666e_JaffaCakes118.exe
Resource
win7-20240705-en
General
-
Target
94a6f97b693f9eaece9dd7def93d666e_JaffaCakes118
-
Size
2.1MB
-
MD5
94a6f97b693f9eaece9dd7def93d666e
-
SHA1
eebe8e6d47470066573d5a0bd71a0b0570423c4d
-
SHA256
cb0e1a4e33544eeb070b546ea7509ead5a91a4f1e7cd9eecdbfedbbf51c783d3
-
SHA512
05ce8387ad3dbd0626bd7c2aeecc5e55d942bf7badb7cdb1d0579a134913a80710712be581d96eec12fe426574fde8b907810dade05d8b857fb91af7ac5e996a
-
SSDEEP
49152:+slVrIe946YGEPI3MlwKjvKSTdPWzaJZCrDBOZCa:+sV946FE7SFo
Malware Config
Signatures
-
resource yara_rule sample vmprotect -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 94a6f97b693f9eaece9dd7def93d666e_JaffaCakes118
Files
-
94a6f97b693f9eaece9dd7def93d666e_JaffaCakes118.exe windows:4 windows x86 arch:x86
8784b629491fedbfe768d86bc3e7c18e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
rasapi32
RasHangUpA
kernel32
GlobalAlloc
GetModuleFileNameW
GetModuleHandleA
LoadLibraryA
LocalAlloc
LocalFree
GetModuleFileNameA
ExitProcess
user32
GetWindowLongA
gdi32
PathToRegion
winmm
midiStreamOut
winspool.drv
OpenPrinterA
advapi32
RegOpenKeyExA
shell32
Shell_NotifyIconA
ole32
StgOpenStorageOnILockBytes
oleaut32
OleCreateFontIndirect
comctl32
ord17
oledlg
ord8
ws2_32
WSAAsyncSelect
wininet
InternetCloseHandle
comdlg32
GetSaveFileNameA
Sections
.text Size: - Virtual size: 542KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 1.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 211KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vmp0 Size: - Virtual size: 333KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: 2.1MB - Virtual size: 2.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE