Behavioral task
behavioral1
Sample
JaffaCakes118_8783ebdfe9039bdcfbfb0bfd51cbb281.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_8783ebdfe9039bdcfbfb0bfd51cbb281
-
Size
1.9MB
-
MD5
8783ebdfe9039bdcfbfb0bfd51cbb281
-
SHA1
34e06056ef612da6ecc2bd913c15391b103274ec
-
SHA256
06904515892beb8dfe95ff780d3909c2415c6d8d44eb1a8eaf92d102e29e737a
-
SHA512
cbe627af692647ffcdcf51b631a9c4324f5d61f1e5ef3053e62fce32f68787fea5e1016a4fc9dc14d29d62cadef87ecda213bf1c5f4b36885114d55f35ebc221
-
SSDEEP
49152:VB3cqBHK1JXUiKBqKr1KYToHdfBfG0zIfziprGKL:VZBH4X3KBJ1KlHdfBfNGzip
Malware Config
Signatures
-
resource yara_rule sample vmprotect -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource JaffaCakes118_8783ebdfe9039bdcfbfb0bfd51cbb281
Files
-
JaffaCakes118_8783ebdfe9039bdcfbfb0bfd51cbb281.exe windows:5 windows x86 arch:x86
0b323282c7b1883e807be84d8efcc190
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleFileNameA
GetCurrentProcess
LocalAlloc
GetCurrentProcess
GetCurrentThread
LocalFree
GetModuleFileNameW
GetProcessAffinityMask
SetProcessAffinityMask
SetThreadAffinityMask
Sleep
ExitProcess
GetLastError
FreeLibrary
LoadLibraryA
GetModuleHandleA
GetProcAddress
advapi32
OpenProcessToken
RegQueryValueExA
OpenSCManagerW
EnumServicesStatusExW
OpenServiceW
QueryServiceConfigW
CloseServiceHandle
gdi32
CreateDCA
gdiplus
GdipLoadImageFromStreamICM
msvcp60
?begin@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEPADXZ
msvcrt
_wrename
shell32
ShellExecuteA
shlwapi
PathFileExistsA
urlmon
URLDownloadToFileA
user32
GetWindowTextLengthA
CharUpperBuffW
wininet
InternetCloseHandle
winmm
waveInOpen
ws2_32
htons
wtsapi32
WTSSendMessageW
Sections
.text Size: - Virtual size: 59KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vmp1 Size: - Virtual size: 1.9MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp2 Size: 1.9MB - Virtual size: 1.9MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 288B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ