Behavioral task
behavioral1
Sample
07542e1d257a76c07906ce83efc10785_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
07542e1d257a76c07906ce83efc10785_JaffaCakes118
-
Size
700KB
-
MD5
07542e1d257a76c07906ce83efc10785
-
SHA1
9229b446b25ddf7b2cde76821cc654ad5655222b
-
SHA256
9bc4971aa1988398fc4c3d83aca94a859d6792abdfaf814c3cd586b7316a9775
-
SHA512
aa749c059ae9084b8aec03d23b5366ea9a099f51b610144e2133874a8460b11f465a3f29835397161691f99068bcff4089fd15895eb273fc79e42b52ec186d93
-
SSDEEP
12288:Ud9sJ3sL25zFRP1k4Tn5Aivqc7dHqB2oYqCpDs0QT/ea/ks+D4vJnGniLd7:tZTuiiEHqB4O3p+kvknA
Malware Config
Signatures
-
resource yara_rule sample vmprotect -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 07542e1d257a76c07906ce83efc10785_JaffaCakes118
Files
-
07542e1d257a76c07906ce83efc10785_JaffaCakes118.exe windows:4 windows x86 arch:x86
114e1cd779e9adb642f6291bce80f129
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
rasapi32
RasGetConnectStatusA
kernel32
HeapAlloc
GetModuleHandleA
LoadLibraryA
LocalAlloc
LocalFree
GetModuleFileNameA
ExitProcess
user32
PeekMessageA
gdi32
PtVisible
winmm
midiStreamStop
winspool.drv
OpenPrinterA
advapi32
RegQueryValueA
shell32
ShellExecuteA
ole32
CoFreeUnusedLibraries
oleaut32
VariantCopy
comctl32
ord17
oledlg
ord8
ws2_32
WSAStartup
wininet
InternetReadFile
comdlg32
ChooseColorA
Sections
.text Size: - Virtual size: 595KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 95KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 263KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vmp0 Size: - Virtual size: 361KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
.tls Size: 4KB - Virtual size: 24B
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp1 Size: 684KB - Virtual size: 682KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE