Behavioral task
behavioral1
Sample
d072f063dacfe536fe3e6d22b0edff5e_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
d072f063dacfe536fe3e6d22b0edff5e_JaffaCakes118
-
Size
972KB
-
MD5
d072f063dacfe536fe3e6d22b0edff5e
-
SHA1
62d9b01525b3676e40465ea9a4ec1e355d5d0370
-
SHA256
59365c8a226c139422a4f45c3163f5afa40c7a30e6cd2a33cf8af172f27c6b18
-
SHA512
7a0cc198a60c99b333f91183941cdcf6e59fc4797e3da3668be0d86dd3f41866238bef57b4197191a6f797d24d672bb2b9263a151aeaa4bd14a69c5f86981296
-
SSDEEP
24576:XRflsn1p1ZPaHqIvrLtnySlNaAxMzGw3v+ItBsRe+i:h9e/1ZyHV0hYMCF8sRe+
Malware Config
Signatures
-
resource yara_rule sample vmprotect -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d072f063dacfe536fe3e6d22b0edff5e_JaffaCakes118
Files
-
d072f063dacfe536fe3e6d22b0edff5e_JaffaCakes118.exe windows:4 windows x86 arch:x86
0ce1910aaf6a120ae0ebd68406969c79
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
rasapi32
RasHangUpA
kernel32
GetStringTypeW
GetModuleHandleA
LoadLibraryA
LocalAlloc
LocalFree
GetModuleFileNameA
ExitProcess
user32
SetClipboardData
MessageBoxA
gdi32
ExtTextOutA
winmm
midiStreamProperty
winspool.drv
OpenPrinterA
advapi32
RegCloseKey
shell32
ShellExecuteA
ole32
CoRegisterMessageFilter
oleaut32
SysAllocString
comctl32
ord17
oledlg
ord8
ws2_32
inet_ntoa
wininet
InternetCrackUrlA
comdlg32
GetOpenFileNameA
Sections
.text Size: - Virtual size: 578KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 189KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 175KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 104KB - Virtual size: 116KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vmp0 Size: - Virtual size: 413KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: 864KB - Virtual size: 862KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE