Behavioral task
behavioral1
Sample
3aac4dd66c0e7fc05e8477b65515c8ae_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
3aac4dd66c0e7fc05e8477b65515c8ae_JaffaCakes118
-
Size
964KB
-
MD5
3aac4dd66c0e7fc05e8477b65515c8ae
-
SHA1
ef581909f8515a8950a3b14b7134b9b720b5fbc3
-
SHA256
ba959c69f792ec4ecef5dda547fde877d9fedf602f3d9f97b49f1224135ae8fa
-
SHA512
99b51aa30c48835150ba6005e910806487b2bc92fb2e55100dd7747bac9749cc918a21b2555ea68e3e7e092c75959341a0c89ce24fc2db45f9187a9b6e6899ff
-
SSDEEP
24576:RRXj1t4erXW5PMBrFXd8jE6j/2jAMshHKEg3+zTSM:7XD4eL40BJXyjdj//L5/qM
Malware Config
Signatures
-
resource yara_rule sample vmprotect -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3aac4dd66c0e7fc05e8477b65515c8ae_JaffaCakes118
Files
-
3aac4dd66c0e7fc05e8477b65515c8ae_JaffaCakes118.exe windows:4 windows x86 arch:x86
d7bb0642c119c530ab1af95bf0b6495a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
rasapi32
RasGetConnectStatusA
kernel32
VirtualFree
GetModuleHandleA
LoadLibraryA
LocalAlloc
LocalFree
GetModuleFileNameA
ExitProcess
user32
IsIconic
MessageBoxA
gdi32
LPtoDP
winmm
midiOutPrepareHeader
winspool.drv
DocumentPropertiesA
advapi32
RegCreateKeyA
shell32
ShellExecuteA
ole32
OleInitialize
oleaut32
SysAllocStringByteLen
comctl32
ImageList_Destroy
oledlg
ord8
ws2_32
ioctlsocket
wininet
InternetCanonicalizeUrlA
comdlg32
GetSaveFileNameA
Sections
.text Size: - Virtual size: 578KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 190KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 175KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 104KB - Virtual size: 116KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vmp0 Size: - Virtual size: 405KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: 856KB - Virtual size: 853KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE