DllCanUnloadNow
DllGetClassObject
DllGetDataSnapClassObject
DllRegisterServer
DllUnregisterServer
ExitAlchemy
InitAlchemy
WEP
___CPPdebugHook
Overview
overview
4Static
static
3EAGLECLIEN...er.exe
windows7-x64
1EAGLECLIEN...er.exe
windows10-2004-x64
1EAGLECLIENT/Send1.doc
windows7-x64
4EAGLECLIENT/Send1.doc
windows10-2004-x64
1EAGLECLIEN...2-.doc
windows7-x64
4EAGLECLIEN...2-.doc
windows10-2004-x64
1EAGLECLIENT/Send2.doc
windows7-x64
4EAGLECLIENT/Send2.doc
windows10-2004-x64
1EAGLECLIENT/Send3.doc
windows7-x64
4EAGLECLIENT/Send3.doc
windows10-2004-x64
1EAGLECLIENT/Send4.doc
windows7-x64
4EAGLECLIENT/Send4.doc
windows10-2004-x64
1EAGLECLIENT/Send5.doc
windows7-x64
4EAGLECLIENT/Send5.doc
windows10-2004-x64
1EAGLECLIENT/Send6.doc
windows7-x64
4EAGLECLIENT/Send6.doc
windows10-2004-x64
1EAGLECLIENT/midas.dll
windows7-x64
1EAGLECLIENT/midas.dll
windows10-2004-x64
1Static task
static1
Behavioral task
behavioral1
Sample
EAGLECLIENT/ClientCaller.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
EAGLECLIENT/ClientCaller.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
EAGLECLIENT/Send1.doc
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
EAGLECLIENT/Send1.doc
Resource
win10v2004-20240419-en
Behavioral task
behavioral5
Sample
EAGLECLIENT/Send2-.doc
Resource
win7-20240215-en
Behavioral task
behavioral6
Sample
EAGLECLIENT/Send2-.doc
Resource
win10v2004-20240419-en
Behavioral task
behavioral7
Sample
EAGLECLIENT/Send2.doc
Resource
win7-20240220-en
Behavioral task
behavioral8
Sample
EAGLECLIENT/Send2.doc
Resource
win10v2004-20240419-en
Behavioral task
behavioral9
Sample
EAGLECLIENT/Send3.doc
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
EAGLECLIENT/Send3.doc
Resource
win10v2004-20240419-en
Behavioral task
behavioral11
Sample
EAGLECLIENT/Send4.doc
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
EAGLECLIENT/Send4.doc
Resource
win10v2004-20240419-en
Behavioral task
behavioral13
Sample
EAGLECLIENT/Send5.doc
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
EAGLECLIENT/Send5.doc
Resource
win10v2004-20240226-en
Behavioral task
behavioral15
Sample
EAGLECLIENT/Send6.doc
Resource
win7-20231129-en
Behavioral task
behavioral16
Sample
EAGLECLIENT/Send6.doc
Resource
win10v2004-20240419-en
Behavioral task
behavioral17
Sample
EAGLECLIENT/midas.dll
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
EAGLECLIENT/midas.dll
Resource
win10v2004-20240419-en
Target
02e61696a7a323489340e94fd0515fc5_JaffaCakes118
Size
664KB
MD5
02e61696a7a323489340e94fd0515fc5
SHA1
dfe5587e926f2293f0c3010e79ebfa6b13bcf4be
SHA256
cf308efa9d7217ab0fb36fe147931ae2cac24c146c572228bf11ec0f5f7ac48b
SHA512
3dc05ce16d12f6fb53a2903b1050395d997b78821b7617e2aae63a6f45d09abdd734d9cb6491edc307b46285e41545a40847cb87372bb12bcec6f84ce59839a0
SSDEEP
12288:bH4i7CqsxSzp7Hz5kmkxdBVbbGfikIbj/AEdzOSb071kxW7g+Ufv/3Db2MfB8Og:bH7CH0dHzSmqP96i1bj/N90+xW7gV/2x
Checks for missing Authenticode signature.
resource |
---|
unpack001/EAGLECLIENT/ClientCaller.exe |
unpack001/EAGLECLIENT/midas.dll |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
RegCloseKey
RegCreateKeyExA
RegDeleteKeyA
RegOpenKeyExA
RegSetValueExA
CloseHandle
CompareStringA
CreateFileA
DeleteCriticalSection
EnterCriticalSection
ExitProcess
FreeEnvironmentStringsA
GetACP
GetCPInfo
GetCurrentThreadId
GetEnvironmentStrings
GetFileType
GetLastError
GetLocalTime
GetLocaleInfoA
GetModuleFileNameA
GetModuleHandleA
GetOEMCP
GetProcAddress
GetProcessHeap
GetStartupInfoA
GetStdHandle
GetStringTypeA
GetStringTypeW
GetSystemDefaultLangID
GetUserDefaultLCID
GetVersion
GetVersionExA
GlobalAlloc
GlobalFree
GlobalHandle
GlobalLock
GlobalMemoryStatus
GlobalUnlock
HeapAlloc
HeapFree
InitializeCriticalSection
IsValidLocale
LCMapStringA
LeaveCriticalSection
LoadLibraryA
MultiByteToWideChar
OutputDebugStringA
RaiseException
RtlUnwind
SetConsoleCtrlHandler
SetFilePointer
SetHandleCount
SetLastError
SetThreadLocale
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
VirtualAlloc
VirtualFree
VirtualQuery
WideCharToMultiByte
WriteFile
lstrcatA
lstrcmpA
lstrcmpiA
lstrcpyA
lstrcpynA
lstrlenA
CharLowerA
CharUpperA
EnumThreadWindows
LoadStringA
MessageBoxA
wsprintfA
StringFromGUID2
LoadTypeLi
RegisterTypeLi
SafeArrayAccessData
SafeArrayAllocData
SafeArrayAllocDescriptor
SafeArrayDestroyDescriptor
SafeArrayRedim
SafeArrayUnaccessData
UnRegisterTypeLi
DllCanUnloadNow
DllGetClassObject
DllGetDataSnapClassObject
DllRegisterServer
DllUnregisterServer
ExitAlchemy
InitAlchemy
WEP
___CPPdebugHook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ