Behavioral task
behavioral1
Sample
12858210a6308ddf05a6e732422d78be_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
12858210a6308ddf05a6e732422d78be_JaffaCakes118
-
Size
848KB
-
MD5
12858210a6308ddf05a6e732422d78be
-
SHA1
71f176ebb9d237a64e9ab6e0e7fca71b9a78c75b
-
SHA256
72e42d89fb79fa9556d8efb09872b1aa4a5a5001ca4b65deb7dc05e798996756
-
SHA512
c8098a06e77fcd11ba08153a6e2d1cc24e522244fb7c44bab64fda0ab53115c5f3184a1c54f1adf17b769a1e2aed6f1f29cc9b28b47b5ce99d72a8b98ae1297d
-
SSDEEP
12288:UF69HLqv0/m7N2hbH9zcRMKtNK0gWOM84Vyinf4LaAu+Exo8So6a2aSQt4BVJUU/:Uky2ZG6KtfvVPgLaPxt6a/+BVy
Malware Config
Signatures
-
resource yara_rule sample vmprotect -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 12858210a6308ddf05a6e732422d78be_JaffaCakes118
Files
-
12858210a6308ddf05a6e732422d78be_JaffaCakes118.exe windows:4 windows x86 arch:x86
814e3223cbd946d1a8d757baf0334702
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
winmm
midiStreamStop
ws2_32
ioctlsocket
kernel32
WaitForMultipleObjects
GetModuleHandleA
LoadLibraryA
LocalAlloc
LocalFree
GetModuleFileNameA
ExitProcess
user32
GetClientRect
gdi32
StartPage
winspool.drv
ClosePrinter
advapi32
RegCloseKey
shell32
Shell_NotifyIconA
ole32
StgCreateDocfileOnILockBytes
oleaut32
VariantChangeType
comctl32
ImageList_Destroy
oledlg
ord8
comdlg32
GetFileTitleA
Sections
.text Size: - Virtual size: 504KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 126KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 187KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vmp0 Size: - Virtual size: 425KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: 832KB - Virtual size: 829KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE