nnzp^�Q1�pS��+l��r8zv�B_v^ ��!&B �D� �_`�[O+�ld���Z�k{A�ˊ�М�B���[N�K>�����b"��_v>�f|D�D��j���g9�_���� >?6�3�!7O�39E}Ds홈%�[~��H %jL!�z 7���x5��J,��nS�P(tЇ��LEX�!40��8b�BoLOW��u�R���!��y�P�n���Ǽ�w�Ql�(�J��[w��Y��U����h����dC ��@�����KX��]�Uq���I��2�~$=���k�D���V�3d�š�$I3�p��qi1g�9O�k�@����(N�D�1x݇��� vwiP:��H����۲^���`<���E�b�����I�Ľ!լ�v惔��������Dj=/�I4�fB���d&G72�Ve@@�ڜ0��37K�p7|�k��(���uVn���أ��А�>k>J vtv'�s ~�5>mE�jL�Pt���Air�#�2�J�����x����l����#�U�Lf�C����)+m3�� W�(��^�U���]���B|ޤ}KO�����A�TSrNb������ϴO�PE�i�XK2OqV�Y���y!�zKs���]��X`�%��n��x��WB� ����E߄u�H�=U:orj���8����B�z47��:��"�>+���-���&H:��88����I�7��wK��o"#}P��ƅK�!c��ϩ�fñ�6�䒪&�xfբ������Q��Uӣ�mI9��Ts[�X��n����u=�m������� k ��{�ߕTޡ���"���\ �y>���H)Л��cM�~ˉ�n�K��S�ֿT'���"��颈s`�e'���O�Om�ѫ#cW��w�{� ���N*�}@�X/�I\x=e���v��9D���|�w�m���Z�1#v}(΄�pn#�M�"� �� fm�)���Ē>tԽ����q������I�%ܢqR���MOK�7f��!ϢL��EϜ�2i�9�l�����5ZeoC��@�3^�Tg��' O@Ɣ��u����jSD�Q1 �D�tj�R�Q��Zo��X�0�͟o���=餞�T�f$^���7fL�q8\�o`e�Z��9��q��nX�3gl�{{?��9�N�a0�k��e%���'����eu�LoS��B�d�G�S�bM�[Z)�rKj��y04�V%q� <�#�Vo� �*=t7���;�����9W�덍~P��`x��JW��j�Q�uaD�A���*� �\N�Q�J�3,w�_�V(sr�9k@5~��s�2GR&Z�QY�_�Z�$;Ԥ��S��n�|C�ƞQ�G����K�;����/���e�43!�b�����p�Hox������=�}U�r��{�Y�H��X���c۬���m���ո��hxm �N�)�F�ס�hvJ�=$�>�78T�-]P�����D�����0uŇ8i�wk���U?�z\��,a����N�V ��diY��M�g>z�'�@`�ە�9�N.@�!E��CKm�=ex�yaN������{#]e�_�G�>eiߊ��Z���*���h:ȅ�P��v�3� 'U0`��ڬ$����"j�}��'[�Cѯ'��*I�o��!Q���?� G#Y�*?_ʨu���`·�@��BpẔ{'���:�қ���m�^]���~)�W�� �UO�$$�ݝ�m�Df"B�u�&��<������Ds���=r��f�� �?��;��\b�/>�EvOx����5n��*�}N��x&���Z�Ϳd%�Z'C�� 3����v<BWm�P���w�o(05k�<�#���^��0_����\��NU/�l�@�z�z�ds|��\�K�\��Ŧ��LLyt���'���[m��'3��`B&h>�|s��"!&�6�����䏜��ty���RiG���V,"H6uO+<=�4��T�{��xbPo\��c�3�����Oko��<�B�~��bT�B��r)И�h�!�ɡ���ߌ�肠�Dv��#o#nó�R����t5�a�Y7I/�/�D��4 "���|,+��o2z������4�OuI]o���A��8����d�A �� ��D˃#���0�V*{��MD�%-�<7�����0�b�ҭ�(�G����ql�"����)�F�0��G�+$��/E!���B&2l矃��a���9��2��1X$}�} +R�� ��k�qr�-'����K����������I@��q/�L6U`��!{��w��i���^�%brS�Q��'�;��w�j����E����e����a�ɭ.1S�A�j=�L\N��]��#����� ���~���'V:�w�hU�z�1�������5�t�kP���UGd��$Ϝπp<���Hv�g-� ��B-�)%�Y��58W�rX�����ڧ��iMo]�36'���i��:����\L��^ο\I���@s��K��/��9���s�8�.|>@��ǒAI!�+i$d :`��"�Bf�}�0�ޕ�f\%-g��9���0���=���QFb��b�3,9xmmߜN��l�-8z�zWk�f�s�B��4v@̘�����S��|kuG_f�3f؆�H�Ip�ak�`�ê/�ĭ8O�+J�acn���k�M9�i[������'�b�.LZ*D+��J]T��#����z僡Q��I�*Ѝ)�����ށ�!p�^����7Y�Q���lY�{� ��و%NgEʯ룱����q{"��9\E">.�w�61j�O�v��%I�����Yu�υwI�`[�J+f�i��s�F�wD�Li"ƾ�m�_Ê�N���p�q��[�ǔ �ut�%].r�j���.*�/ṅm���3�>�ϫ0LxI��G� <#\X0 f����="�]�~Kg�p� �L����#ƌ�,����@��tFULJ��r+�H�3Ы{����5LW���.�E;��bFڂ[�� ��k�c���c�\듊�q3�OX���)�c�b-ԩ��4������g{l �jc��*�θ�:�6~ie=��m��a�y��Q�=�/��}�����Cr
Behavioral task
behavioral1
Sample
46792510f1e643cd0c9e7c60a203ee8c_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
46792510f1e643cd0c9e7c60a203ee8c_JaffaCakes118
-
Size
868KB
-
MD5
46792510f1e643cd0c9e7c60a203ee8c
-
SHA1
76ca047e0913a91444879b11d1d8181fea9c921c
-
SHA256
d0f047927abc90bb686a9f0676e931c1a803bccceb70d2e54569225f27493ed4
-
SHA512
5414be6c7558e01bf50942b5ea125bedf6737aca7a4f2c4e50370fcb84b81beb9b6ff484a037bc5c362ea24303c1b66087d6d5ee6b9e893d6569cd5444d3520c
-
SSDEEP
12288:K08KMuuU/m8MkwCSvs6ZhefONQeidooBcjHKz792z4XBBk82soHtCFgmN2EG8SH:F8Kz/ekwvvuxBuKc0Xk8KwqmN2QUOp1
Malware Config
Signatures
-
resource yara_rule sample vmprotect -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 46792510f1e643cd0c9e7c60a203ee8c_JaffaCakes118
Files
-
46792510f1e643cd0c9e7c60a203ee8c_JaffaCakes118.exe windows:4 windows x86 arch:x86
9da3e3641f48f7e94664fbed835debf4
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
MultiByteToWideChar
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
GetCurrentProcess
DuplicateHandle
SetLastError
lstrcpynA
GetVersion
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
lstrcmpA
lstrcmpiA
SetStdHandle
CompareStringW
CompareStringA
IsBadCodePtr
IsBadReadPtr
GetStringTypeW
GetStringTypeA
SetUnhandledExceptionFilter
SetEnvironmentVariableA
IsBadWritePtr
VirtualAlloc
LCMapStringW
LCMapStringA
VirtualFree
HeapCreate
HeapDestroy
GetEnvironmentVariableA
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetACP
HeapSize
WritePrivateProfileStringA
GetFileAttributesA
GetCommandLineA
SetCurrentDirectoryA
CreateSemaphoreA
ResumeThread
ReleaseSemaphore
EnterCriticalSection
LeaveCriticalSection
CreateEventA
GetFullPathNameA
FindResourceA
LoadResource
LockResource
CreateThread
GetModuleFileNameA
Sleep
MulDiv
GetProfileStringA
CreateFileA
WriteFile
ReadFile
GetLastError
WaitForMultipleObjects
SetEvent
GlobalAlloc
WaitForSingleObject
CloseHandle
GetCurrentThreadId
ExitProcess
GetModuleHandleA
GetProcAddress
LoadLibraryA
FreeLibrary
GlobalSize
GlobalLock
GlobalFree
DeleteCriticalSection
InitializeCriticalSection
GetLocalTime
GetSystemTime
GetTimeZoneInformation
RaiseException
TerminateProcess
RtlUnwind
GetStartupInfoA
SetErrorMode
GetOEMCP
GetCPInfo
GetProcessVersion
GlobalFlags
TlsGetValue
LocalReAlloc
TlsSetValue
TlsFree
GlobalHandle
TlsAlloc
LocalAlloc
GetFileTime
GetFileSize
GetVersionExA
lstrcatA
lstrlenA
WinExec
lstrcpyA
FindFirstFileA
FindNextFileA
FindClose
FileTimeToLocalFileTime
FileTimeToSystemTime
LocalFree
WideCharToMultiByte
InterlockedDecrement
InterlockedIncrement
GetVolumeInformationA
GetTickCount
GlobalUnlock
GlobalReAlloc
HeapFree
HeapReAlloc
GetProcessHeap
HeapAlloc
GetCurrentThread
LoadLibraryA
VirtualProtect
GetModuleFileNameA
ExitProcess
user32
GetWindowRect
GetSystemMetrics
RedrawWindow
InvalidateRect
EnableWindow
wsprintfA
IsWindowVisible
FillRect
OffsetRect
GetClientRect
PtInRect
SetParent
SendMessageA
LoadCursorA
IsRectEmpty
IsWindow
DestroyIcon
IntersectRect
SetRect
InflateRect
SetScrollPos
SetScrollRange
GetWindowLongA
SetWindowLongA
GetScrollRange
PostMessageA
SetCapture
GetSysColor
GetParent
GetCapture
ReleaseCapture
SetTimer
KillTimer
WinHelpA
LoadBitmapA
CopyRect
GetFocus
ChildWindowFromPointEx
ScreenToClient
GetMessagePos
UpdateWindow
SetWindowRgn
DestroyCursor
DestroyAcceleratorTable
IsChild
GetWindow
GetTopWindow
GetActiveWindow
SetWindowPos
SetFocus
DestroyMenu
SetActiveWindow
IsIconic
PeekMessageA
SetMenu
GetMenu
SetCursorPos
GetCursorPos
SetForegroundWindow
ValidateRect
SystemParametersInfoA
TranslateMessage
LoadIconA
ShowWindow
IsWindowEnabled
TranslateAcceleratorA
CopyAcceleratorTableA
PostQuitMessage
IsZoomed
GetClassInfoA
DefWindowProcA
CreatePopupMenu
AppendMenuA
ModifyMenuA
CreateMenu
CreateAcceleratorTableA
EqualRect
GetSubMenu
EnableMenuItem
GetDC
ReleaseDC
GetDlgCtrlID
GetWindowPlacement
RegisterWindowMessageA
GetForegroundWindow
GetLastActivePopup
GetMessageTime
RemovePropA
CallWindowProcA
GetPropA
UnhookWindowsHookEx
SetPropA
GetClassLongA
CallNextHookEx
SetWindowsHookExA
CreateWindowExA
DestroyWindow
GetWindowTextA
GetWindowTextLengthA
GetDlgItem
GetMenuItemID
GetMenuItemCount
RegisterClassA
GetScrollPos
AdjustWindowRectEx
MapWindowPoints
SendDlgItemMessageA
CharUpperA
UnregisterClassA
ScrollWindowEx
IsDialogMessageA
SetWindowTextA
MoveWindow
GetWindowDC
BeginPaint
EndPaint
TabbedTextOutA
DrawTextA
GrayStringA
GetNextDlgTabItem
CheckMenuItem
SetMenuItemBitmaps
GetMenuState
GetMenuCheckMarkDimensions
CreateDialogIndirectParamA
EndDialog
GetClassNameA
GetDesktopWindow
GetSysColorBrush
LoadStringA
EnumDisplaySettingsA
LoadImageA
MessageBoxA
CreateIconFromResourceEx
CreateIconFromResource
DrawIconEx
DrawFrameControl
DrawEdge
DrawFocusRect
GetClipboardData
OpenClipboard
EmptyClipboard
SetClipboardData
CloseClipboard
GetMessageA
DispatchMessageA
SetCursor
GetKeyState
SetRectEmpty
RegisterClipboardFormatA
ClientToScreen
WindowFromPoint
MessageBoxA
gdi32
StartDocA
BeginPath
EndPath
PathToRegion
CreateEllipticRgn
CreateRoundRectRgn
GetSystemPaletteEntries
CreatePalette
SelectPalette
RealizePalette
GetDIBits
SetBkColor
CreatePolygonRgn
GetWindowExtEx
GetViewportOrgEx
GetWindowOrgEx
SetStretchBltMode
StretchBlt
CreateDIBitmap
GetClipRgn
SelectClipRgn
DeleteObject
LPtoDP
CreateRectRgnIndirect
DeleteDC
EndDoc
GetTextColor
GetBkMode
GetBkColor
GetROP2
GetPolyFillMode
StartPage
EndPage
CreateCompatibleBitmap
CreateDCA
GetDeviceCaps
DPtoLP
CreateBitmap
CreateCompatibleDC
SelectObject
BitBlt
GetObjectA
CreatePen
PatBlt
Rectangle
Ellipse
RoundRect
FillRgn
GetCurrentObject
CreateRectRgn
CombineRgn
GetTextExtentPoint32A
CreateSolidBrush
GetStockObject
CreateFontIndirectA
GetTextMetricsA
GetClipBox
SetTextColor
SaveDC
RestoreDC
SetBkMode
SetPolyFillMode
SetROP2
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowOrgEx
SetWindowExtEx
ScaleWindowExtEx
ExcludeClipRect
MoveToEx
LineTo
GetStretchBltMode
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetViewportExtEx
ExtSelectClipRgn
winmm
midiStreamRestart
midiStreamClose
midiOutReset
midiStreamStop
midiStreamOut
midiOutPrepareHeader
midiStreamProperty
midiStreamOpen
midiOutUnprepareHeader
waveOutOpen
waveOutGetNumDevs
waveOutClose
waveOutReset
waveOutPause
waveOutWrite
waveOutPrepareHeader
waveOutUnprepareHeader
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
advapi32
RegCreateKeyExA
RegCloseKey
RegQueryValueA
RegOpenKeyExA
RegSetValueExA
shell32
ShellExecuteA
Shell_NotifyIconA
ole32
OleUninitialize
CLSIDFromString
OleInitialize
oleaut32
LoadTypeLi
RegisterTypeLi
UnRegisterTypeLi
comctl32
ord17
ImageList_Destroy
ws2_32
getpeername
accept
recv
ioctlsocket
recvfrom
inet_ntoa
WSAAsyncSelect
closesocket
WSACleanup
comdlg32
GetFileTitleA
GetSaveFileNameA
GetOpenFileNameA
ChooseColorA
Exports
Exports
Sections
.text Size: - Virtual size: 398KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 885KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 133KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 64KB - Virtual size: 75KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vmp0 Size: - Virtual size: 112KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.tls Size: 4KB - Virtual size: 24B
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp1 Size: 792KB - Virtual size: 791KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 132B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ