Static task
static1
Behavioral task
behavioral1
Sample
WoWEmuHacker5.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
WoWEmuHacker5.exe
Resource
win10v2004-20240226-en
General
-
Target
f2c900f4ad92e71a0fa2a32699a1d019_JaffaCakes118
-
Size
676KB
-
MD5
f2c900f4ad92e71a0fa2a32699a1d019
-
SHA1
c340da08b2bd44adca2611cdfc19f391df84c79d
-
SHA256
08f80818ad2a7866fbb04b3f24c94d1c5da163d4423ff01f3a4c93abe6246e67
-
SHA512
976db73216ba1092ccd9d6365a9b9f49bd81a7f7329b2764dd740b9926e87138fecf122cfd3118c17a002c55c41c78127d64fb54a2e8f52230df578ec2af01c4
-
SSDEEP
12288:a4NLKr6vizJ9t0ImeZdAYuLaEzpMkfELZXETgQDL/+EIWam5Y/CjuNJCC2dFeD:dlKr6vwJAImYAYC1tMGELJELL2EIWamK
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/WoWEmuHacker5.exe
Files
-
f2c900f4ad92e71a0fa2a32699a1d019_JaffaCakes118.rar
-
WEH5ColorConfig.ini
-
WEHBGS/BG1B.bmp
-
WEHBGS/Thumbs.db
-
WEHBGS/bg.bmp
-
WEHBGS/blackblue.bmp
-
WEHLanguage.ini
-
WEHTeleportList.txt
-
WoW MD5 Hashs - README.txt
-
WoWEmuHacker5.exe.exe windows:5 windows x86 arch:x86
7c3132aae06a340ec8fb25cd8a34ff3f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
GetModuleHandleA
GetProcAddress
user32
GetDC
gdi32
LineTo
comdlg32
GetFileTitleA
winspool.drv
OpenPrinterA
advapi32
RegOpenKeyA
shell32
ShellExecuteA
comctl32
_TrackMouseEvent
shlwapi
PathIsUNCA
oledlg
ord8
ole32
OleInitialize
oleaut32
VariantClear
winmm
PlaySoundA
Sections
.MPRESS1 Size: 181KB - Virtual size: 780KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.MPRESS2 Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 35KB - Virtual size: 36KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
lpkyjhu Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE