Behavioral task
behavioral1
Sample
a9ff22b09b71238d4610b64399982df9_JaffaCakes118.exe
Resource
win7-20240705-en
General
-
Target
a9ff22b09b71238d4610b64399982df9_JaffaCakes118
-
Size
512KB
-
MD5
a9ff22b09b71238d4610b64399982df9
-
SHA1
1f0ab5bff2cf1eed2f6af55ca3d5d3d502595f0e
-
SHA256
fbc09c89c0f4acfe5f1d0254071510ebd5b940692bf6749058824f5e1bae46ce
-
SHA512
3cb3014b1e0f3df7e40ce968d74ec046720d2e5bf7d1bf51492d588e09d1766ae00b990628a645382debc0783b3dab19df8861629b1b7f3611b93925be4c2e41
-
SSDEEP
12288:/zcveTkMiZAA3me2S9NCF7sa0oFZRxICOM4GiQ2bpLl7:b/iFQ7F7gOZiQSLl7
Malware Config
Signatures
-
resource yara_rule sample vmprotect -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a9ff22b09b71238d4610b64399982df9_JaffaCakes118
Files
-
a9ff22b09b71238d4610b64399982df9_JaffaCakes118.exe windows:4 windows x86 arch:x86
462db481ce766360fe96d50dbecb58ac
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateFileA
DeleteFileA
GetTickCount
MultiByteToWideChar
WideCharToMultiByte
ReadFile
GetFileSize
MoveFileA
FindNextFileA
FindFirstFileA
FindClose
FlushFileBuffers
SetStdHandle
SetFilePointer
GetStringTypeW
GetStringTypeA
GetOEMCP
GetACP
WriteFile
RaiseException
VirtualAlloc
LCMapStringW
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
RtlUnwind
VirtualFree
HeapCreate
HeapDestroy
GetVersionExA
GetEnvironmentVariableA
GetLastError
TlsGetValue
SetLastError
TlsAlloc
TlsSetValue
DeleteCriticalSection
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetCurrentProcess
InterlockedIncrement
InterlockedDecrement
GetVersion
GetCommandLineA
GetStartupInfoA
LCMapStringA
GetModuleFileNameA
IsBadReadPtr
HeapFree
HeapReAlloc
HeapAlloc
ExitProcess
GetProcessHeap
LoadLibraryA
GetTempPathA
LocalAlloc
LocalFree
lstrcpynA
Beep
GetCurrentThread
GetProcAddress
lstrcpyn
GetModuleHandleA
TerminateProcess
OpenProcess
SetWaitableTimer
CreateWaitableTimerA
Module32First
Sleep
CreateThread
GetCurrentThreadId
GetSystemDirectoryA
Process32Next
Process32First
CreateToolhelp32Snapshot
MulDiv
CloseHandle
RtlMoveMemory
MapViewOfFile
GetCPInfo
OpenFileMappingA
VirtualProtect
GetModuleFileNameA
ExitProcess
user32
SetMenuItemBitmaps
SetMenuDefaultItem
wsprintfA
CreateMenu
LoadKeyboardLayoutA
GetKeyboardLayoutNameA
ActivateKeyboardLayout
GetKeyboardLayout
SystemParametersInfoA
GetKeyboardLayoutList
UnloadKeyboardLayout
GetDialogBaseUnits
SendDlgItemMessageA
SetDlgItemTextA
GetDlgItemTextA
SetDlgItemInt
GetDlgItemInt
CreateDialogParamA
DialogBoxParamA
SetMenuItemInfoA
CheckMenuItem
RemoveMenu
MenuItemFromPoint
GetMenuDefaultItem
GetMenuInfo
GetMenuState
GetMenuItemRect
RegisterClassExA
GetClassInfoExA
DrawMenuBar
SetMenu
GetMenu
GetSystemMetrics
IsZoomed
IsIconic
GetSysColor
FillRect
SetClassLongA
SetWindowRgn
RemovePropA
GetPropA
SetPropA
MessageBoxA
SetWindowTextA
GetWindowTextLengthA
EnableWindow
IsWindowEnabled
GetDC
ReleaseDC
LoadMenuA
RegisterWindowMessageA
PeekMessageA
GetMessageA
TranslateMessage
DispatchMessageA
GetMenuItemInfoA
GetMenuStringA
TrackPopupMenu
SetForegroundWindow
CheckMenuRadioItem
GetMenuItemID
GetSubMenu
SetMenuInfo
InsertMenuA
GetMenuItemCount
AppendMenuA
DestroyMenu
CreatePopupMenu
GetSystemMenu
ShowWindow
SetParent
SetWindowPos
MoveWindow
ScreenToClient
GetParent
UpdateWindow
ValidateRect
InvalidateRect
GetWindowRect
GetFocus
SetFocus
IsWindow
GetDlgItem
GetWindowLongA
GetClassLongA
CallNextHookEx
SetWindowsHookExA
CreateWindowExA
UnhookWindowsHookEx
SetWindowLongA
DestroyIcon
TrackMouseEvent
SetCursor
DefMDIChildProcA
DestroyWindow
EndDialog
GetClientRect
DefWindowProcA
GetAsyncKeyState
SendMessageA
EndPaint
BeginPaint
PostMessageA
GetForegroundWindow
CallWindowProcA
EnumWindows
MsgWaitForMultipleObjects
GetWindowThreadProcessId
GetClassNameA
GetWindowTextA
IsWindowVisible
GetWindow
GetDesktopWindow
PostThreadMessageA
MessageBoxA
gdi32
SetBkColor
SetTextColor
CreateRoundRectRgn
CreatePatternBrush
CreateSolidBrush
StretchBlt
GetObjectA
DeleteDC
BitBlt
SelectObject
CreateCompatibleDC
GetStockObject
DeleteObject
GetDeviceCaps
CreateFontA
shell32
SHGetPathFromIDListA
SHGetSpecialFolderLocation
DragAcceptFiles
Shell_NotifyIconA
DragFinish
DragQueryFileA
ShellExecuteA
atl
ord42
ord47
advapi32
RegQueryValueExA
RegCreateKeyExA
RegDeleteValueA
RegEnumValueA
RegFlushKey
RegSetValueExA
RegCreateKeyA
RegCloseKey
RegDeleteKeyA
RegOpenKeyA
CryptGetHashParam
CryptDestroyHash
CryptHashData
CryptReleaseContext
CryptAcquireContextA
CryptCreateHash
ole32
CoUninitialize
CoInitialize
oleaut32
VarR8FromCy
VarR8FromBool
SafeArrayCreate
SysAllocString
VariantClear
SafeArrayDestroy
Sections
.text Size: - Virtual size: 134KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 459KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: 476KB - Virtual size: 472KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 104B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ