�����$dD�g�ݴS��^�vN�S�٣��".K�[@�1�i���r��"�[�� J��-�G����,�5��ON�� ��ӂ0BHu�D I�uM����:w)�*Ha�Q��<ڑ :v�ol�*Ƈc��͚ƥ��~3 ��� O��l��*��bC�8Q��D ]@N?���%��sgMUx�3���?f�k8��*��kMd� qA���t��/C�vB�+%S�Fk�5�T%Q�*�դ��[�v�{�l�L���tO/����R��rt����lN�Y���'�m���1'Z�r�"�YRw|�x��Y㝂CU�U�瑁\k�ׂ�L���^��]p �m�%z��h�m�g; e�(U ��[�6���6tLJ���� ���nҞ��zX�k �<���\������8r_����R����V&;����Ay߶s��%~��NE����xM0�J�G6��# �m��E�3�r)��"�)f�f��;n?&�LS�� M|%��f"2�,ai�"�!N�8:!ܭfG��Վ��xH-��G�ٻU������V4�����I{L��LP�e�LE+��F�������҆��jyEb� �[۵��{"��[�l�e��� �z�T�J�7 >���@�柹���4�(E�0�gQ�i��}A�����i�"síyɰ'm�]Zu�lrA�*�+d���74�]�YH+VI�KB��\�Kk% |��Ze�>�������|Z^�.#�%�X����b�Y� E��{}��.TJIӄLj�Km�?����C�uL�:���1�r� !TQ�@C�7��ݱ�N�����������t����<��(��H���D?��W��a0�l ���0�D�}���֛����sF�I�z�[��p�]�����@�;/���w@t�)�/��L�n�勂w-=��k8��ّ� H�#��p�F� \#c�0���"��q�Uw�>Rw�E��#Q�PQR�6 �����<��)�s��G..z�����,��C�1���u���z�ɴ8Y����F�%�i�I\=�E���?q�Q����|���� $��&]o��;N�u��8Ԣ$�-f�_��X�@��RF����e� �gK�P> ڙ�� ������^w��.�ק?AS���T���#`V;k <�)� 2E�YI��2�E�^��:�����kB������y/�� �.����1���[���b� ُ���4�.����4��a�T��|������K�<��a�Z�,�%�C�]���x��֙��ҨAQ7�<�{� ��?-��'bG4^վ� �}�����)G����(8�ȐX�O����<��"��H�MG����NnP%}ڶS�pGnαL\+OYY���V�N0ČO��Uu�� ]:�6� &%��Kx�XY�Ԉ�T��ăp�*p���4��k6�ygx��e�EG�i.�� @m�l���MxD�l����M*���~Į��.SR��ˮ, Sp��!a����� VL�I�.�$i��hS黓�V*�iV��� e[�r�-�v�+�w�T��Ґ5����%�^�H�,x��b `$��hfÊ���o�ť����*�Z�����|s�9�. ����s@�X������*٧� ̧s����-���]��L����u(2�� ���b�����/7��U��uޱ�7�;���;�[��D��:�V\Q����;���H|-0�]�N�p�6�@w��YJE�N�7^v$�V��Hge�F]��r�:�Şz����b4ƂV�q�QX�TB�t�uP!M�НG�$��\J-Q�ľ6"̈ɝk�Y�*��b5$l�8��m*���n�u�נtdQ�\`G�5_r�s�Z�qc�ľ����@��2K���`�7w�� fh�YϨ��̅[ρ��I�k0 ��{��"����6��`�:���? �?5>�!�Bt���g���iY8�l�D}�U�&����� 8EU�Yָ}76:A�b'ZI2F��)��{W� u`��V�A'�{3J��ُ��o�*�TOX�|3n-d�Kc���~�ׄ��U-��8����0��|R�*nv.i���-E�nބZ�å�?�*d?�k��Q���'�+�w�Y_�$�����ܻ�$z (��e�/�fN<��)U +EZ�zU�w<����u�.4��H�L*`����V� ���F���j�X2a�����,t;�:��?���tq�r���.������%9�2Zvk�\���_�3�:y4�u��,l�ƿ�O$������5$8*��J] 1�R���[��A�:{Ni�(�xgDk�jFg6��W��tm�5�����m�Zg���j�����%(�f{��l]s�_7�Pdb�a� �(5tk6mB pCǎE�E�Bp.ռ�e9���WBqk�n�o� ��b3���eBRX��u逌Ì���=���(����=D�1�N���+��N�9o�ŐK�O��:��{���2�KB3��3ʫ^�<F ���(�swj��0e_�k�ތQ���s[�����u���12���JV�"�/�K����|��%��A`�C}�C�{gHX���0 ��Y�8(��d�-p����<J�鏪� 1+!����}�XJS�y��*,_q�1j(��dܤ}�F@���ke�ɣ:�+����5Z-�ʲxRcn��T���+��0(�{��AR��1��{⋕�=H��\��vTA/�r��K|`N �̓sx�'?>���a��j���&�;�'y�c?vyJ��"��ǡ�v`���Q(S{��� ,�c��aH:�K���������"��c����m����9B��0ia5=��3Ot[ӕ��Xx�Ta�o��9B�'��To���klƂ�]��jx�xN�o�C�.�����bO3�}k���U�[e&K!"c`h�7X���'��O��Q�TG�ߩf_�d&�DM���*9���(W��ș��6��Ӄ:h��er�7����U\�9�*m����pi�ڨ����]C��<a~5�_� �����n�A�:��頂��kH�!�c�:Y��jU3�q����9����L07�� � �/�B�>�� H��b۳
Behavioral task
behavioral1
Sample
1bbe827187c2a8623bcc490953e45ad7_JaffaCakes118.exe
Resource
win7-20240419-en
General
-
Target
1bbe827187c2a8623bcc490953e45ad7_JaffaCakes118
-
Size
236KB
-
MD5
1bbe827187c2a8623bcc490953e45ad7
-
SHA1
0e573433b6eb2f4877b066fd8919d85ca2b1c36d
-
SHA256
5e039bf28bdff9b52bce291fd9830125da60d768497254de26bc864b37c29859
-
SHA512
3625f4769f25fb6cd2f11c40f10de7e3d562b3a3f7772668aff01be8f2ec7bb3a0be7e0bdcb25f664c35e4dfcd9fbd722eb0d7354607d45fe2f807e4bbd8b019
-
SSDEEP
6144:Y96AQGrE9DcQ0i8RfiyG68Sn68KijOkqX6Fbq2TzjDICh:YoAxrE9DcQ6qy38STjO36tjHIC
Malware Config
Signatures
-
Processes:
resource yara_rule sample vmprotect -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 1bbe827187c2a8623bcc490953e45ad7_JaffaCakes118
Files
-
1bbe827187c2a8623bcc490953e45ad7_JaffaCakes118.exe windows:4 windows x86 arch:x86
5d24b2da76516db2af7609ef2dad4264
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mfc42
ord2982
ord3147
ord3259
ord4465
ord3136
ord3262
ord2985
ord3081
ord2976
ord3830
ord3831
ord3825
ord3079
ord4080
ord4627
ord4424
ord3721
ord809
ord795
ord2614
ord556
ord2414
ord4275
ord5290
ord5875
ord5277
ord1088
ord2122
ord3874
ord3797
ord6358
ord535
ord6197
ord6880
ord941
ord5572
ord926
ord3619
ord3626
ord3663
ord1641
ord2860
ord2859
ord2864
ord2379
ord3402
ord567
ord4673
ord4274
ord6375
ord4486
ord2554
ord2512
ord5731
ord3922
ord1089
ord5199
ord2396
ord3346
ord5300
ord5302
ord2725
ord4079
ord4698
ord5307
ord5289
ord5714
ord4622
ord3738
ord2124
ord815
ord2514
ord2621
ord1247
ord1134
ord641
ord693
ord616
ord818
ord537
ord5265
ord4376
ord4853
ord4998
ord4710
ord6052
ord1775
ord5280
ord4425
ord3597
ord324
ord4234
ord2135
ord2302
ord6385
ord6153
ord3790
ord354
ord668
ord5981
ord665
ord1979
ord353
ord2770
ord356
ord4160
ord755
ord470
ord5186
ord5442
ord3876
ord3318
ord922
ord2764
ord3906
ord6215
ord4204
ord3317
ord6930
ord3873
ord2029
ord5773
ord939
ord1168
ord2863
ord2411
ord2023
ord4218
ord2578
ord4398
ord3582
ord1146
ord2582
ord4402
ord3370
ord3640
ord2077
ord1949
ord4034
ord2446
ord5261
ord1727
ord5065
ord3749
ord6376
ord2055
ord2648
ord4441
ord4837
ord3798
ord4353
ord6374
ord5163
ord2385
ord5241
ord4407
ord1776
ord4078
ord6055
ord2642
ord4278
ord2915
ord3092
ord6199
ord1200
ord2818
ord4919
ord540
ord860
ord4277
ord858
ord800
ord6282
ord791
ord523
ord3717
ord967
ord1995
ord5479
ord5797
ord4975
ord4863
ord4335
ord4447
ord4411
ord2032
ord5482
ord5811
ord4779
ord5308
ord823
ord561
ord825
ord1576
msvcrt
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
_onexit
__dllonexit
fopen
fread
fclose
strncpy
_open
_filelength
_close
_mbscmp
time
srand
_snprintf
rand
_mbsrchr
memcmp
_except_handler3
_mbsstr
strtol
strncmp
sprintf
_setmbcp
_ltoa
_itoa
strcpy
__CxxFrameHandler
strlen
sscanf
atoi
memcpy
memset
_controlfp
strcat
strncat
kernel32
Sleep
CreateRemoteThread
GetProcAddress
GetModuleHandleA
WriteProcessMemory
VirtualAllocEx
lstrlenW
OpenProcess
lstrcmpiW
Module32NextW
Module32FirstW
CreateToolhelp32Snapshot
GetLastError
CreateMutexA
DeleteFileA
LoadResource
SizeofResource
FreeLibrary
GetCurrentDirectoryA
MapViewOfFile
CreateFileMappingA
FindClose
FindNextFileA
FindFirstFileA
GetModuleFileNameA
Process32Next
Process32First
WritePrivateProfileStringA
CreateDirectoryA
GetPrivateProfileStringA
GetPrivateProfileIntA
ExitProcess
GetTickCount
GetStartupInfoA
LoadLibraryA
GetWindowsDirectoryA
lstrcpyA
lstrlenA
WinExec
lstrcatA
CloseHandle
FindResourceA
WaitForSingleObject
VirtualFreeEx
LoadLibraryA
VirtualProtect
GetModuleFileNameA
ExitProcess
user32
InvalidateRect
RedrawWindow
SetCapture
GetParent
EnableWindow
wsprintfW
GetSystemMetrics
wsprintfA
DrawIcon
AppendMenuA
GetSystemMenu
ReleaseDC
KillTimer
LoadIconA
SendMessageA
InflateRect
LoadCursorA
CopyIcon
GetSysColor
IsWindow
SetWindowLongA
SetCursor
ReleaseCapture
GetDC
GetClientRect
IsIconic
GetWindowRect
MessageBoxA
SetTimer
MessageBeep
PtInRect
MessageBoxA
gdi32
GetObjectA
CreateFontIndirectA
GetStockObject
GetTextExtentPoint32A
advapi32
RegQueryValueA
RegCloseKey
RegOpenKeyExA
shell32
SHGetPathFromIDListA
ShellExecuteA
SHBrowseForFolderA
wsock32
gethostbyname
inet_addr
WSACleanup
WSAStartup
Exports
Exports
Sections
.text Size: - Virtual size: 72KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vmp0 Size: - Virtual size: 132KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 4KB - Virtual size: 24B
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp1 Size: 200KB - Virtual size: 198KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 268B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ