|F}�L���۵/-50>�S�+�Ot��&��O#_���/��^��٨�R�{L�m8pG�c����y�%�����y�� 'wc�a�E���@�N��_yݰ�T����ף��-�� �t���jU�oE$�[�O�PN�5r����9s������}�*Xl��U�F%*]%=��?��.F�[��K51Q/�'F_���Dž��bIm��A��i��N��cOŮ�F����&ٱ$v9���U��n��P��n&�:�]JUq��ŝ`���&���$����tRZڛ��$81(��r�؎���\�u�㭁f��.y#�J�e��*l��S$�z�Ӣ��R�.EWf�G����@�ix}�>'w��Cd-p�ր���SSj� V!�j���9�y�/���J�T�Ȝ;}����`M�8��t�2��Ճ�}��;f�Q��59Ll� �l�"�n�=�'�f-��\���q�Vp��}�j�F���������ED�kmB#��Quh�z���wˀ����c�:�u����$v�=8E@��rk��������p�1�g�##sܰ�C7TL��t��m���%S���L�Z�� �{��H}�m���r��O�no༘drS̞V �����[�BȚN��|]�3��M?x-nE�N������8���s�d��:GJIj�zI�X�&��Qچ�#j����;�_���ِiB)��G0�+M�_��Ȫc VY��B�8��1�s���.� !4S���J%َ�q���퓾*k�˥N��#<&;f�;���:p)����n�ˤTsB�&�i-Θ\x�T�nn�8!�j���P���6,�)�xl2�zj/5�:�S�Fq7�q�b�}+h�9����[v4�k���[���ʫ��8�����~��m�Jς2��rG��~A-:C����>�y�P<fd�����'���� �w��z�Ced�b�h�ro� =�'�����ףX~�d���Œ����Ӫߔ��(d~=���i%#�vA�xn��2��#��t�v���Z>6eZHe���"����V�����WA�:��>��J?���Q��{q8{r�lX��M�Pq;�L./�go�e�y�,m�9���m�&�6Eg�F��~����k��2�ӝ J\h�ޑ�.�aV�������$�[ҿ���T���o}$;�dL�G���! ��~�H�Kp��:7�Oa����Vq3���VF�? Ϙ�WH�s�+2\��� �K@]����]T��G�F�Ř,\���& �;� F�9������}��%��M���eA��:�/_� �O c-������LJ������7T�AH����Y)������M�b[�v��w���rykBB�Tb�l���_դSt����~��MN�ԭS���U����än�,4Q�[�?�P��2>��o�!�DG�Ne����l��O��J�� �|FW+$k�N#�oO{��(�msb���m0�a�b���,<���J��9�)�l�,�A���V��DY�ᔾ�!�����J��ӏ����z� �`�Y� px�v��^ �%��N��f�E�.S�\�B�vZ9����HO���Q�4�'�4���e���Br�FDf���cSB{b�a}92��7��ڬ�ױ��\K� �V������z�{���X�81=�q�V4�E)Mv��VFF��f��Rٛ�������,�7)w�N��A��\��5�� �+�PXD;Bׂ_��� z���>$�A�`�OO\�ꮙ�����!U�[6 G��@+m��Jv�����&�Ycj0�>��>��G��!�I?�[���(�$���A�N�b���,kQ���w����M%ܤ(���1|�L�8���U?��ֈ��[wo��y�J��Ո"������xE ���s_����mb��iu�j$T-{=oHz7NT�/F|%՞D��M�]�u �8tV���f�`$���Hw�k��@�]p�NJ}o�n�Al#��L�,�7���i�@m���t�?�7�u��=V�\�y< �`��'���S0)]���E��X��{���X0��=��30�@�N�ç�����.�c�E��fs◟�~#T/=1Q��BpX����EJ??:�/9�,Xׯ�^r_t��V�I��� e����UѸ��oqu/A!�å�a�eV(�P�F�"٦g/绑�����s�����D�]Mc��w� ��t'@ơ���C|gu��I����&Xw>�V,}���^��B���4"P.��i��/Q����{����i�J�N�jݯ����)��.�N�~ a����F������_*�M���,�c`�P�dA�[�� ��Y:\��+�9Ȕ����!IzkK,�b�bj�$��!�!9b��w!\����?=�EP̘%8�{C̑3�w7:�n^�ﻉ�J�u J���m��U<�ߦD��D��i��{-�&/[n���$��/��!c�%v�_*Q�(�R�NT����c�v���(6� o`t��wCѮh���x����l4�n��ؓJ�Y�rO�<��U�I���Ҫ�01��`��ڽl�y��&q�0�=`"����ݕq����7u���fC�H$aZMZ���Hn{��1��%f�Joҧ%��O�Bd�%0�o�i#�#��m� ��㉻���\���4��"'ֺ�&��9/ �SM� �V�ۑ�_��?)��/�rEH�������<�b|�� �\�`��_��K1v&e�\HO�����]��{�bz��֯X|g74���;� �����Q��w�j��?�{�-(����vN���6��HDE3�b���Ђ�fqr�T�di����1z�(({^�|}�V�YJU��!#�-&�オ~�[k�}�?�~�DtP�OK����)��W&O���Lʏа��������V1��@ke��*ڜ�7�+�T���F���6�5(�~u0xMr��ߒ-3����������A�7�#A"�~{��V߿]};omΒؖ*1��G:``��̩��0�)�����B�?P���;��� �/}�)��Z��w&�� ����� ��L��c������F"�(R�{zGE�
Behavioral task
behavioral1
Sample
da5fef9fe2c0cb1c15b2b54d1818cb90_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
da5fef9fe2c0cb1c15b2b54d1818cb90_JaffaCakes118
-
Size
436KB
-
MD5
da5fef9fe2c0cb1c15b2b54d1818cb90
-
SHA1
c6e936dea6b8511104e27a081d6ee0e194cdf895
-
SHA256
15063ded7b4fad4f2a377f8f138cf3b407b0e5c6bbe27b9a0119fccb9b33757f
-
SHA512
2b1fda9dc27a0b28d550389f13a532423f6ab6a29b3230dd71ad70f3c86e4a2ef2554f44c99e18170c363d483f3e0101a3d4a4f5f32dfeb8c0bf7b8256f00f50
-
SSDEEP
12288:dnpzDHAhJ2TV+Xo0SyA88ntiSvFb7o7AcvHyz:dn1TsJ2cXo0bA/tiSNIAgHyz
Malware Config
Signatures
-
resource yara_rule sample vmprotect -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource da5fef9fe2c0cb1c15b2b54d1818cb90_JaffaCakes118
Files
-
da5fef9fe2c0cb1c15b2b54d1818cb90_JaffaCakes118.exe windows:5 windows x86 arch:x86
c16198a59937b6af75b1cfc68d06cb97
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapFree
HeapAlloc
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
GetSystemTimeAsFileTime
GetTimeFormatA
GetDateFormatA
HeapReAlloc
GetCommandLineA
GetStartupInfoA
RtlUnwind
RaiseException
ExitThread
CreateThread
HeapSize
SetStdHandle
GetFileType
GetACP
IsValidCodePage
HeapCreate
VirtualFree
SetErrorMode
GetStdHandle
GetTimeZoneInformation
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
SetHandleCount
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
InitializeCriticalSectionAndSpinCount
GetDriveTypeA
GetConsoleCP
GetConsoleMode
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
GetLocaleInfoW
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetProcessHeap
CompareStringW
SetEnvironmentVariableA
GetFileSizeEx
GetFileTime
GetFileAttributesA
GetFullPathNameA
GetVolumeInformationA
DuplicateHandle
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
GetCurrentDirectoryA
GetOEMCP
GetCPInfo
GlobalFlags
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
GlobalHandle
GlobalReAlloc
TlsGetValue
GetModuleHandleW
LocalAlloc
DeleteCriticalSection
InitializeCriticalSection
FileTimeToLocalFileTime
FindNextFileA
InterlockedDecrement
GetModuleFileNameW
GetCurrentProcessId
SuspendThread
SetEvent
WaitForSingleObject
ResumeThread
SetThreadPriority
CreateEventA
WritePrivateProfileStringA
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
lstrcmpA
FileTimeToSystemTime
GetThreadLocale
InterlockedIncrement
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
CompareStringA
lstrcmpW
GetVersionExA
FreeResource
FormatMessageA
LocalFree
MulDiv
lstrcpynA
GetProcAddress
GetModuleHandleA
SetLastError
GetFileSize
WriteFile
GetLastError
GetCurrentProcess
lstrlenA
FreeLibrary
LoadLibraryA
GetWindowsDirectoryA
MultiByteToWideChar
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
GetTickCount
Sleep
ExitProcess
TerminateThread
CreateMutexA
DeleteFileA
SetFilePointer
GetModuleFileNameA
ReadFile
CloseHandle
CreateFileA
FindClose
FindFirstFileA
ResetEvent
InterlockedExchange
LeaveCriticalSection
EnterCriticalSection
FindResourceA
LoadResource
LockResource
SizeofResource
WideCharToMultiByte
GetModuleHandleA
LoadLibraryA
LocalAlloc
LocalFree
GetModuleFileNameA
ExitProcess
user32
PostThreadMessageA
RegisterWindowMessageA
SendDlgItemMessageA
WinHelpA
IsChild
GetCapture
SetWindowsHookExA
CallNextHookEx
GetClassLongA
GetClassNameA
SetPropA
GetPropA
RemovePropA
SetFocus
GetWindowTextLengthA
GetWindowTextA
GetForegroundWindow
GetLastActivePopup
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
PeekMessageA
MapWindowPoints
SetMenu
IsWindowVisible
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
EqualRect
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
GetMenu
SetWindowPos
OffsetRect
IntersectRect
SystemParametersInfoA
GetWindowPlacement
GetWindow
GetDesktopWindow
CreateDialogIndirectParamA
GetWindowLongA
GetDlgItem
IsWindowEnabled
GetNextDlgTabItem
EndDialog
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
CopyRect
ClientToScreen
GetMessagePos
ScreenToClient
UpdateWindow
UnionRect
DrawEdge
DrawFrameControl
DrawFocusRect
GetFocus
GetKeyState
DispatchMessageA
TranslateMessage
SetForegroundWindow
SetActiveWindow
MessageBoxA
ExitWindowsEx
CopyIcon
LoadCursorA
InflateRect
ReleaseDC
GetParent
GetSysColor
IsWindow
SetWindowLongA
InvalidateRgn
SetRect
IsRectEmpty
SetCursor
SetCapture
EnableWindow
SendMessageA
CopyAcceleratorTableA
RedrawWindow
ReleaseCapture
PtInRect
LockWindowUpdate
InvalidateRect
PostMessageA
KillTimer
GetDC
GetWindowRect
DrawIcon
GetSystemMetrics
IsIconic
SetTimer
LoadMenuA
GetClientRect
AppendMenuA
RegisterClipboardFormatA
GetSystemMenu
LoadIconA
UnregisterClassA
CharUpperA
MessageBeep
GetNextDlgGroupItem
DestroyWindow
GetSysColorBrush
WindowFromPoint
GetWindowThreadProcessId
GetMessageA
GetCursorPos
ValidateRect
DestroyMenu
SetWindowContextHelpId
MapDialogRect
PostQuitMessage
CharNextA
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
ModifyMenuA
EnableMenuItem
CheckMenuItem
EndPaint
BeginPaint
GetWindowDC
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
ShowWindow
MoveWindow
SetWindowTextA
IsDialogMessageA
GetActiveWindow
gdi32
RestoreDC
SetBkMode
SetMapMode
ExcludeClipRect
IntersectClipRect
GetViewportExtEx
GetWindowExtEx
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
SaveDC
SetWindowExtEx
ScaleWindowExtEx
ExtSelectClipRgn
CreateBitmap
GetBkColor
GetTextColor
CreateRectRgnIndirect
GetMapMode
GetRgnBox
SetTextColor
SetBkColor
GetClipBox
GetDeviceCaps
GetCurrentObject
GetTextExtentPoint32A
CreateFontIndirectA
GetStockObject
SetDIBColorTable
SelectObject
GetDIBColorTable
StretchBlt
CreateDIBSection
CreateCompatibleDC
DeleteDC
ScaleViewportExtEx
DeleteObject
GetObjectA
msimg32
AlphaBlend
TransparentBlt
comdlg32
GetFileTitleA
winspool.drv
DocumentPropertiesA
ClosePrinter
OpenPrinterA
advapi32
RegCreateKeyExA
RegOpenKeyA
RegEnumKeyA
RegDeleteKeyA
RegSetValueExA
RegOpenKeyExA
RegQueryValueExA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegCloseKey
RegQueryValueA
shell32
ShellExecuteA
Shell_NotifyIconA
comctl32
InitCommonControlsEx
shlwapi
PathFindFileNameA
PathStripToRootA
PathIsUNCA
PathFindExtensionA
oledlg
ord8
ole32
CLSIDFromProgID
CoRegisterMessageFilter
CreateStreamOnHGlobal
CoTaskMemFree
CoTaskMemAlloc
CLSIDFromString
CoGetClassObject
StgOpenStorageOnILockBytes
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
OleUninitialize
CoFreeUnusedLibraries
OleInitialize
CoRevokeClassObject
OleIsCurrentClipboard
OleFlushClipboard
oleaut32
VariantChangeType
VariantInit
SysAllocStringLen
OleCreateFontIndirect
VariantCopy
SysAllocStringByteLen
SafeArrayDestroy
VariantTimeToSystemTime
SystemTimeToVariantTime
SysAllocString
VariantClear
SysStringLen
SysFreeString
gdiplus
GdipGetImageWidth
GdipGetImageHeight
GdipGetImagePixelFormat
GdipGetImagePaletteSize
GdipGetImagePalette
GdipCloneImage
GdipCreateBitmapFromScan0
GdipBitmapLockBits
GdipBitmapUnlockBits
GdiplusStartup
GdipDrawImageI
GdipDeleteGraphics
GdipGetImageGraphicsContext
GdipDisposeImage
GdiplusShutdown
GdipAlloc
GdipCreateBitmapFromStream
GdipFree
winmm
sndPlaySoundA
iphlpapi
GetAdaptersInfo
wininet
HttpOpenRequestA
InternetConnectA
HttpSendRequestA
InternetWriteFile
InternetSetFilePointer
InternetSetStatusCallback
InternetGetLastResponseInfoA
HttpQueryInfoA
HttpAddRequestHeadersA
InternetQueryDataAvailable
InternetCloseHandle
InternetOpenUrlA
InternetOpenA
DeleteUrlCacheEntry
InternetReadFile
Exports
Exports
Sections
.text Size: - Virtual size: 509KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 109KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 9KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vmp0 Size: - Virtual size: 54KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 24B
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp2 Size: 424KB - Virtual size: 424KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 196B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ