Behavioral task
behavioral1
Sample
5283583f78c1ee2b7c555e813811290d_JaffaCakes118.dll
Resource
win7-20240903-en
General
-
Target
5283583f78c1ee2b7c555e813811290d_JaffaCakes118
-
Size
424KB
-
MD5
5283583f78c1ee2b7c555e813811290d
-
SHA1
ab5a3b8a739ad764cbe1c656e840951cfa6a2ed4
-
SHA256
b85952dae3f79bbee7cfa9b4971452a8e7b8eb274b3659d4b1803c64e0f4590c
-
SHA512
8fcf63e2bc8da15bc29dc420574ee2994f1ea078a8aa601b0cc21da76bd190c1cd9963f5ed0183fe86ce918fe19085d7cba3cac936512b3f891cab86b0f3bfc4
-
SSDEEP
12288:D2UclsmKSWLLCX0jKN+mSCKP0DdJ3I56r:SUclNGLCEI+mnK756r
Malware Config
Signatures
-
resource yara_rule sample vmprotect -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5283583f78c1ee2b7c555e813811290d_JaffaCakes118
Files
-
5283583f78c1ee2b7c555e813811290d_JaffaCakes118.dll windows:4 windows x86 arch:x86
9e9691f8d76e334e573d4284c4d7d301
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
WritePrivateProfileStringA
FileTimeToSystemTime
FileTimeToLocalFileTime
RtlUnwind
GetFileType
HeapFree
HeapAlloc
GetCommandLineA
RaiseException
TerminateProcess
HeapSize
HeapReAlloc
GetACP
GetTimeZoneInformation
SetStdHandle
SetHandleCount
GetStdHandle
GetStartupInfoA
GetEnvironmentVariableA
GetVersionExA
GetFileTime
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetUnhandledExceptionFilter
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetDriveTypeA
IsBadReadPtr
IsBadCodePtr
CompareStringA
CompareStringW
SetEnvironmentVariableA
GetFileSize
GetFileAttributesA
GetOEMCP
GetCPInfo
GetProcessVersion
GlobalFlags
SetErrorMode
LocalReAlloc
TlsSetValue
EnterCriticalSection
GlobalReAlloc
LeaveCriticalSection
TlsFree
GlobalHandle
DeleteCriticalSection
TlsAlloc
InitializeCriticalSection
LocalAlloc
MulDiv
GetFullPathNameA
lstrcpynA
GetVolumeInformationA
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
CreateFileA
DuplicateHandle
FindNextFileA
GetLastError
CloseHandle
GetModuleFileNameA
GlobalAlloc
lstrcmpA
GetCurrentThread
LocalFree
lstrlenA
InterlockedDecrement
InterlockedIncrement
GetVersion
lstrcatA
GetCurrentThreadId
GlobalGetAtomNameA
lstrcmpiA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
lstrcpyA
GlobalLock
GlobalUnlock
GlobalFree
LockResource
FindResourceA
LoadResource
FlushInstructionCache
SetLastError
FindFirstFileA
FindClose
GetCurrentProcessId
OpenProcess
VirtualAllocEx
VirtualQuery
ExitProcess
MultiByteToWideChar
WideCharToMultiByte
TlsGetValue
OpenFileMappingA
MapViewOfFile
LoadLibraryA
GetProcAddress
FreeLibrary
GetCurrentProcess
VirtualProtect
ReadProcessMemory
WriteProcessMemory
GetCurrentDirectoryA
CreateDirectoryA
CreateThread
Sleep
HeapDestroy
GetModuleHandleA
VirtualProtect
GetModuleFileNameA
ExitProcess
user32
ReleaseDC
GetDC
ClientToScreen
TabbedTextOutA
DrawTextA
GrayStringA
UnregisterClassA
GetClassNameA
LoadCursorA
GetSysColorBrush
DestroyMenu
LoadStringA
ValidateRect
SetCursor
PostQuitMessage
WaitMessage
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
ShowWindow
SetWindowTextA
IsDialogMessageA
LoadIconA
PostMessageA
UpdateWindow
SendDlgItemMessageA
MapWindowPoints
PeekMessageA
DispatchMessageA
CharUpperA
AdjustWindowRectEx
GetTopWindow
MessageBoxA
GetCapture
WinHelpA
GetClassInfoA
RegisterClassA
GetMenu
GetMenuItemCount
GetSubMenu
GetMenuItemID
GetWindowTextA
GetKeyState
CreateWindowExA
GetClassLongA
SetPropA
UnhookWindowsHookEx
GetPropA
CallWindowProcA
RemovePropA
DefWindowProcA
GetMessageTime
GetLastActivePopup
GetForegroundWindow
SetForegroundWindow
GetWindow
SetWindowLongA
SetWindowPos
RegisterWindowMessageA
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetNextDlgTabItem
EndDialog
GetActiveWindow
SetActiveWindow
IsWindow
CreateDialogIndirectParamA
GetMessageA
SetFocus
TranslateMessage
DestroyWindow
GetParent
GetWindowLongA
GetDlgItem
IsWindowEnabled
InvalidateRect
ScreenToClient
PtInRect
CopyRect
GetSystemMetrics
GetSysColor
GetWindowRect
FindWindowA
KillTimer
SetTimer
IsWindowVisible
wsprintfA
GetAsyncKeyState
GetCursorPos
SetCursorPos
GetMessagePos
WindowFromPoint
GetClientRect
ShowCursor
GetKeyNameTextA
GetFocus
CallNextHookEx
SetWindowsHookExA
GetWindowThreadProcessId
SendMessageA
EnableWindow
GetDlgCtrlID
MessageBoxA
gdi32
DeleteObject
GetDeviceCaps
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
GetTextExtentPoint32A
SetBkMode
GetStockObject
SelectObject
RestoreDC
SaveDC
DeleteDC
CreateBitmap
GetObjectA
SetBkColor
SetTextColor
GetClipBox
comdlg32
GetFileTitleA
winspool.drv
ClosePrinter
OpenPrinterA
DocumentPropertiesA
advapi32
RegCreateKeyExA
RegOpenKeyExA
RegSetValueExA
RegCloseKey
comctl32
ord17
ImageList_Draw
ImageList_Destroy
ImageList_GetImageInfo
wsock32
WSAAsyncSelect
send
recv
closesocket
inet_ntoa
WSAGetLastError
WSASetLastError
WSAStartup
gethostbyname
inet_addr
WSACleanup
sendto
connect
accept
recvfrom
opengl32
glGetDoublev
glVertex3f
glPushMatrix
glLoadIdentity
glMatrixMode
glFrustum
glPopMatrix
glViewport
glGetIntegerv
glEnable
glBlendFunc
glColor3f
glEnd
glTexEnvi
glPolygonMode
glDisable
glLineWidth
glBegin
glClear
glGetFloatv
glColor4f
glVertex2f
glVertex3fv
glu32
gluProject
winmm
timeGetTime
Sections
.text Size: - Virtual size: 203KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 20.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vmp0 Size: - Virtual size: 74KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: - Virtual size: 271KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp2 Size: 412KB - Virtual size: 408KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 80B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ