Behavioral task
behavioral1
Sample
17fcf84f2b0c59f25ed5295dff177138_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
17fcf84f2b0c59f25ed5295dff177138_JaffaCakes118
-
Size
1.1MB
-
MD5
17fcf84f2b0c59f25ed5295dff177138
-
SHA1
f087485e1bcd6c6efdc0653e40ca4321a023423d
-
SHA256
885cf9b1ae785365a2ca876e248c0e4a0144f7ae7893eaff8755ca668d118790
-
SHA512
22dff2d515d4656cfe22f96f44c7308d146793e232fe5be5135255b39f22e1648cef4f7ae7b4041a279628ef3be8a77f9cfdfc9ca2227d533db1c4043f829a93
-
SSDEEP
24576:YAYUQ6nBp9oMy6dV6GQ648A05Y/L3LyImI/o1JWdo+UUf:YaQ6njyTQ94rv/L3mpqojgQ
Malware Config
Signatures
-
resource yara_rule sample vmprotect -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 17fcf84f2b0c59f25ed5295dff177138_JaffaCakes118
Files
-
17fcf84f2b0c59f25ed5295dff177138_JaffaCakes118.exe windows:4 windows x86 arch:x86
98d4758364e7be1c9c4671bf7fc06172
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
winmm
midiStreamStop
ws2_32
inet_ntoa
kernel32
GetFileSize
GetModuleHandleA
LoadLibraryA
LocalAlloc
LocalFree
GetModuleFileNameA
ExitProcess
user32
EndDialog
MessageBoxA
gdi32
GetStretchBltMode
winspool.drv
DocumentPropertiesA
advapi32
RegCloseKey
shell32
Shell_NotifyIconA
ole32
CLSIDFromString
oleaut32
SafeArrayAccessData
comctl32
ord17
oledlg
ord8
comdlg32
GetSaveFileNameA
Sections
.text Size: - Virtual size: 503KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 955KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 259KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vmp0 Size: - Virtual size: 477KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: 1.1MB - Virtual size: 1.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE