Behavioral task
behavioral1
Sample
417c4a8d87cb814ab7866553de27f368_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
417c4a8d87cb814ab7866553de27f368_JaffaCakes118
-
Size
952KB
-
MD5
417c4a8d87cb814ab7866553de27f368
-
SHA1
1c4628437d1251018afbe7d9ee1837b6301c74f8
-
SHA256
9ba712e2dc1aba97cdef24cca798c464b5a9cef8301d00f865954814fbb9fcf8
-
SHA512
f4b789ab6a506fb1ae3a1ef20758bd8b822f5f943fb9248d8f01b6fb0f494504bd7775a986c6142ea039202b91053587d872932588e6c9dbbbbb2c3d88bf9b92
-
SSDEEP
24576:jjDndQdx6Q8jTLYsMWoapI2mPbiZNGeJlOE:rdmAQ8dlhI2+irne
Malware Config
Signatures
-
resource yara_rule sample vmprotect -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 417c4a8d87cb814ab7866553de27f368_JaffaCakes118
Files
-
417c4a8d87cb814ab7866553de27f368_JaffaCakes118.exe windows:4 windows x86 arch:x86
aabeba2a713a82d5e333e7a97dfb8ae2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
rasapi32
RasHangUpA
kernel32
GetStringTypeA
GetModuleHandleA
LoadLibraryA
LocalAlloc
LocalFree
GetModuleFileNameA
ExitProcess
user32
SetWindowRgn
MessageBoxA
gdi32
CreateCompatibleDC
winmm
waveOutGetNumDevs
winspool.drv
ClosePrinter
advapi32
RegQueryValueExA
shell32
Shell_NotifyIconA
ole32
CoRevokeClassObject
oleaut32
OleCreateFontIndirect
comctl32
ImageList_Destroy
oledlg
ord8
ws2_32
ioctlsocket
wininet
InternetReadFile
comdlg32
GetOpenFileNameA
Sections
.text Size: - Virtual size: 619KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 196KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 175KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 72KB - Virtual size: 85KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vmp0 Size: - Virtual size: 405KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: 876KB - Virtual size: 875KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE