Behavioral task
behavioral1
Sample
155a50f85a0c723cf653b513b14c0090_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
155a50f85a0c723cf653b513b14c0090_JaffaCakes118
-
Size
996KB
-
MD5
155a50f85a0c723cf653b513b14c0090
-
SHA1
0b06fd534fe66f73110e0ce0888d4c04fd408dfd
-
SHA256
92bbdbbf22edd987aaa4fa17f435fdff20f9f31a27594a420a61055c571d0fd6
-
SHA512
d05544a89e493e473229c4b8cff1932d1573924b438aa13a162f6ce3dae61a395d9a1def60fec8312e4c4bf17e4b321e6cd6b74e5e224f5a6793c48c7f035762
-
SSDEEP
24576:M5IvbfZHO8JTt1sSn/C56x6ksY5NfeG3JVuRwIf5OXnj:uIjRHtJTMkXR55WRFhOX
Malware Config
Signatures
-
resource yara_rule sample vmprotect -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 155a50f85a0c723cf653b513b14c0090_JaffaCakes118
Files
-
155a50f85a0c723cf653b513b14c0090_JaffaCakes118.exe windows:4 windows x86 arch:x86
9ed4fa796dd3fab9f7b87b2bf2cda19c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
rasapi32
RasHangUpA
kernel32
SetLastError
GetModuleHandleA
LoadLibraryA
LocalAlloc
LocalFree
GetModuleFileNameA
ExitProcess
user32
GetWindowPlacement
gdi32
EndDoc
winmm
waveOutUnprepareHeader
winspool.drv
DocumentPropertiesA
advapi32
RegCreateKeyExA
shell32
SHGetSpecialFolderPathA
ole32
OleUninitialize
oleaut32
UnRegisterTypeLi
comctl32
ord17
ws2_32
WSACleanup
wininet
InternetConnectA
comdlg32
ChooseColorA
Sections
.text Size: - Virtual size: 504KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 870KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 206KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vmp0 Size: - Virtual size: 312KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
.tls Size: 4KB - Virtual size: 24B
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp1 Size: 980KB - Virtual size: 976KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE