Behavioral task
behavioral1
Sample
e0498a91c0c672608231943c3a4fd903_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
e0498a91c0c672608231943c3a4fd903_JaffaCakes118
-
Size
2.8MB
-
MD5
e0498a91c0c672608231943c3a4fd903
-
SHA1
4d504d4c8341ab9e9172f9711a409a9c21983f25
-
SHA256
f3ce0e44ded1a3f86ed86659030b27132a5c974012deb1adaae71e02236770f8
-
SHA512
7a4bcecb517ac1dde31209ed327f64520d25b965abfac2b441eb00cedad6bac9a332f065650852a74d53358d14dd3bc4fd0e6b1b6d1f83fc575b8df07eecc6ed
-
SSDEEP
49152:EK7tfIpbZilIqKFsNnQuH+mR83/itsJVV9G8inKjR8YNqqFZuwaMMjv:3ZQBIlVDQubRo6tsPV9GHnFajub
Malware Config
Signatures
-
resource yara_rule sample vmprotect -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e0498a91c0c672608231943c3a4fd903_JaffaCakes118
Files
-
e0498a91c0c672608231943c3a4fd903_JaffaCakes118.exe windows:4 windows x86 arch:x86
337c64dbd940656dab538bbec9148f5f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
rasapi32
RasGetConnectStatusA
winmm
waveOutWrite
ws2_32
select
kernel32
LeaveCriticalSection
GetModuleHandleA
LoadLibraryA
LocalAlloc
LocalFree
GetModuleFileNameA
ExitProcess
user32
SetClipboardData
gdi32
SetTextColor
winspool.drv
DocumentPropertiesA
advapi32
RegQueryValueA
shell32
Shell_NotifyIconA
ole32
OleRun
oleaut32
UnRegisterTypeLi
comctl32
ord17
wininet
InternetCloseHandle
comdlg32
GetFileTitleA
Sections
.text Size: - Virtual size: 482KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 2.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 256KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vmp0 Size: - Virtual size: 365KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: 2.8MB - Virtual size: 2.8MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE