d:\BG\app\release\debug\setup.pdb
Static task
static1
Behavioral task
behavioral1
Sample
Nardy_Setup.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
Nardy_Setup.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
spider.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
spider.exe
Resource
win10v2004-20240419-en
General
-
Target
1fb1b9c2c95534a53a441fef3f155f52_JaffaCakes118
-
Size
332KB
-
MD5
1fb1b9c2c95534a53a441fef3f155f52
-
SHA1
9bd19f1bc8de9f31dff0647eb1949cd3cf21c9a6
-
SHA256
8ed7b079aba4fdef0f369c31781976eaa958e449857fec2a26da0340842e0c4f
-
SHA512
286b8be24a41429af5cdcd4319dec3fd88450c2cacb3b9ebeba65aae47bbbe79b8b30829f98b18987c11709618264d1e8e8c9d17c5b42a891ad6f81601c928d0
-
SSDEEP
6144:xpCs3D7RQ9SbG48jOYDZT9RIskiUkTF1ziuqpVwTvGYk8T8u6URBSFjPJX7YrYo:/NTWiibZT9a+TTziVpKDGZOlSFVX7YrH
Malware Config
Signatures
-
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource unpack001/Nardy_Setup.exe unpack001/spider.exe
Files
-
1fb1b9c2c95534a53a441fef3f155f52_JaffaCakes118.rar
-
Nardy_Setup.exe.exe windows:4 windows x86 arch:x86
8cd83b42d6a83ee9d5e7fa5f7dccbd6e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
wininet
InternetCloseHandle
HttpSendRequestA
HttpOpenRequestA
InternetConnectA
InternetOpenUrlA
InternetReadFile
InternetOpenA
netapi32
Netbios
kernel32
FreeLibrary
GlobalDeleteAtom
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
GetCurrentThreadId
FreeResource
InterlockedDecrement
SetThreadPriority
EnumResourceLanguagesA
ConvertDefaultLocale
lstrcmpA
GetCurrentThread
InterlockedIncrement
LocalAlloc
GlobalReAlloc
GlobalHandle
TlsGetValue
TlsAlloc
TlsSetValue
LocalReAlloc
TlsFree
FileTimeToSystemTime
SetErrorMode
FileTimeToLocalFileTime
GetFileAttributesA
GetFileTime
GlobalFlags
GetCPInfo
GetOEMCP
WritePrivateProfileStringA
lstrcatA
HeapFree
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
ExitProcess
RtlUnwind
GetStartupInfoA
GetCommandLineA
HeapReAlloc
ExitThread
CreateThread
HeapSize
HeapDestroy
HeapCreate
VirtualFree
IsBadWritePtr
QueryPerformanceCounter
SetUnhandledExceptionFilter
SetHandleCount
GetStdHandle
GetFileType
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetTimeZoneInformation
IsBadReadPtr
IsBadCodePtr
SetStdHandle
SetEnvironmentVariableA
lstrcmpW
GetModuleHandleA
LoadLibraryA
GetProcAddress
GetFullPathNameA
GetVolumeInformationA
FindFirstFileA
FindClose
lstrcpyA
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
MoveFileA
SetLastError
GlobalFree
SizeofResource
MulDiv
GlobalAlloc
GlobalLock
GlobalUnlock
lstrcpynA
ResetEvent
SetEvent
CreateEventA
SuspendThread
ResumeThread
CreateProcessA
WaitForSingleObject
CreateToolhelp32Snapshot
Process32First
OpenProcess
TerminateProcess
GetCurrentProcessId
Sleep
Process32Next
GetComputerNameA
GetSystemTimeAsFileTime
GetLocalTime
FormatMessageA
LocalFree
GetCurrentDirectoryA
GetTickCount
EnterCriticalSection
LeaveCriticalSection
GetTempPathA
DeleteFileA
CreateDirectoryA
GetModuleFileNameA
CopyFileA
SetCurrentDirectoryA
GetCurrentProcess
SetPriorityClass
CreateFileA
CloseHandle
DeviceIoControl
FindResourceA
LoadResource
LockResource
DeleteCriticalSection
InitializeCriticalSection
RaiseException
CompareStringW
CompareStringA
lstrlenA
lstrcmpiA
GetVersion
GetLastError
WideCharToMultiByte
MultiByteToWideChar
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
HeapAlloc
user32
CharNextA
IsRectEmpty
CopyAcceleratorTableA
InvalidateRect
InvalidateRgn
SetCapture
ReleaseCapture
GetNextDlgGroupItem
MessageBeep
RegisterClipboardFormatA
EndPaint
BeginPaint
GetWindowDC
ReleaseDC
GetDC
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
ShowWindow
MoveWindow
SetWindowTextA
IsDialogMessageA
GetDesktopWindow
CreateDialogIndirectParamA
GetNextDlgTabItem
EndDialog
RegisterWindowMessageA
WinHelpA
GetCapture
CreateWindowExA
SetWindowsHookExA
CallNextHookEx
GetClassLongA
GetClassInfoExA
GetClassNameA
SetPropA
GetPropA
RemovePropA
SendDlgItemMessageA
IsWindow
SetFocus
IsChild
GetWindowTextA
GetForegroundWindow
DispatchMessageA
GetDlgItem
GetTopWindow
DestroyWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
PeekMessageA
MapWindowPoints
GetKeyState
IsWindowVisible
GetMenu
GetSysColor
EqualRect
GetClassInfoA
RegisterClassA
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
GetWindowLongA
SetWindowLongA
SetWindowPos
OffsetRect
IntersectRect
SystemParametersInfoA
GetWindowPlacement
CopyRect
PtInRect
GetWindow
SetMenuItemBitmaps
GetFocus
GetParent
ModifyMenuA
EnableMenuItem
CheckMenuItem
GetMenuCheckMarkDimensions
LoadBitmapA
wsprintfA
GetMenuState
GetMenuItemID
DestroyMenu
LoadCursorA
GetSysColorBrush
SetWindowContextHelpId
MapDialogRect
GetMenuItemCount
GetSubMenu
SetCursor
GetMessageA
TranslateMessage
GetCursorPos
GetLastActivePopup
ValidateRect
LoadIconA
EnumWindows
GetWindowThreadProcessId
LoadImageA
PostQuitMessage
SetForegroundWindow
PostThreadMessageA
MessageBoxA
UnregisterClassA
IsWindowEnabled
GetActiveWindow
SetActiveWindow
GetSystemMetrics
SetRect
EnableWindow
UpdateWindow
GetClientRect
GetWindowRect
IsIconic
PostMessageA
SendMessageA
DrawIcon
CharUpperA
AdjustWindowRectEx
gdi32
ExtSelectClipRgn
DeleteDC
GetStockObject
SetViewportExtEx
GetBkColor
GetTextColor
CreateRectRgnIndirect
GetMapMode
GetRgnBox
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
ScaleWindowExtEx
SetWindowExtEx
GetObjectA
SetBkColor
SetTextColor
GetClipBox
CreateBitmap
GetDeviceCaps
CreateSolidBrush
GetWindowExtEx
GetViewportExtEx
DeleteObject
SetMapMode
RestoreDC
SaveDC
ScaleViewportExtEx
comdlg32
GetFileTitleA
winspool.drv
OpenPrinterA
ClosePrinter
DocumentPropertiesA
advapi32
RegDeleteValueA
RegQueryValueA
RegEnumKeyA
RegOpenKeyA
RegCloseKey
RegDeleteKeyA
RegCreateKeyExA
RegSetValueExA
RegOpenKeyExA
RegQueryValueExA
shell32
SHBrowseForFolderA
SHGetMalloc
SHGetSpecialFolderLocation
SHFileOperationA
SHGetPathFromIDListA
comctl32
ord17
shlwapi
PathIsUNCA
PathFindExtensionA
PathStripToRootA
PathFindFileNameA
oledlg
ord8
ole32
CLSIDFromProgID
CoTaskMemAlloc
CLSIDFromString
CoTaskMemFree
CoInitialize
CoCreateInstance
CoUninitialize
CoRegisterMessageFilter
OleFlushClipboard
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
OleUninitialize
StgOpenStorageOnILockBytes
CoGetClassObject
OleIsCurrentClipboard
CoRevokeClassObject
CoFreeUnusedLibraries
OleInitialize
oleaut32
SysAllocString
SystemTimeToVariantTime
VariantTimeToSystemTime
SafeArrayDestroy
VariantCopy
SysAllocStringLen
VariantInit
VariantChangeType
VariantClear
SysAllocStringByteLen
SysStringLen
OleCreateFontIndirect
SysFreeString
ws2_32
WSACleanup
oleacc
CreateStdAccessibleObject
LresultFromObject
Sections
.text Size: 192KB - Virtual size: 191KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 56KB - Virtual size: 53KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 36KB - Virtual size: 59KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
spider.exe.exe windows:5 windows x86 arch:x86
620e9ad7d19213569a3b3bf180bf2f7a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
spider.pdb
Imports
kernel32
GlobalFree
ReadFile
GlobalAlloc
GetFileSize
Sleep
GetModuleHandleW
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
CloseHandle
GetTickCount
QueryPerformanceCounter
MulDiv
lstrlenW
GetVersionExA
lstrcatW
GetSystemInfo
VirtualProtect
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
LCMapStringW
MultiByteToWideChar
LCMapStringA
RaiseException
VirtualQuery
InterlockedExchange
VirtualAlloc
GetCPInfo
GetOEMCP
GetACP
LoadLibraryA
HeapSize
HeapReAlloc
HeapAlloc
HeapFree
VirtualFree
HeapCreate
HeapDestroy
GetFileType
SetHandleCount
GetEnvironmentStringsW
GetLastError
WideCharToMultiByte
lstrcpyW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetModuleFileNameA
GetStdHandle
GetModuleHandleA
GetProcAddress
ExitProcess
GetCommandLineA
GetStartupInfoA
CreateFileW
WriteFile
advapi32
RegOpenKeyExA
RegQueryValueExW
RegQueryValueExA
RegOpenKeyExW
RegCreateKeyExW
RegSetValueExW
RegCloseKey
gdi32
GetPixel
GetDeviceCaps
CreateFontIndirectW
Ellipse
GetTextExtentPoint32W
SaveDC
ExcludeClipRect
RestoreDC
CreateCompatibleBitmap
GdiFlush
CreateSolidBrush
GetStockObject
GetBkMode
GetTextColor
SetBkMode
SetTextColor
SetPixel
MoveToEx
LineTo
DeleteDC
DeleteObject
BitBlt
SelectObject
CreateCompatibleDC
user32
DispatchMessageW
TranslateMessage
TranslateAcceleratorW
GetMessageW
LoadAcceleratorsW
CreateWindowExW
RegisterClassW
LoadCursorW
LoadIconW
MessageBoxA
WaitMessage
SetDlgItemTextW
GetDlgItem
WinHelpW
CheckDlgButton
IsDlgButtonChecked
CheckRadioButton
GetDlgItemTextW
UnionRect
LoadBitmapW
wsprintfW
LoadStringA
DestroyWindow
GetClientRect
InvalidateRect
SetTimer
BeginPaint
EndPaint
PostQuitMessage
GetSystemMetrics
ShowWindow
GetForegroundWindow
DefWindowProcW
SendMessageW
GetDesktopWindow
GetSubMenu
PtInRect
PostMessageW
ReleaseCapture
IntersectRect
InvertRect
OffsetRect
FillRect
FrameRect
SetRect
DrawTextW
DrawMenuBar
IsZoomed
IsIconic
GetWindowPlacement
SetCapture
GetDC
ReleaseDC
MessageBoxW
LoadStringW
DialogBoxParamW
GetMenu
EnableMenuItem
PeekMessageW
EndDialog
GetParent
GetWindowRect
MoveWindow
UpdateWindow
ntdll
RtlUnwind
shell32
SHGetSpecialFolderPathW
winmm
timeGetTime
PlaySoundW
comctl32
InitCommonControlsEx
Sections
.text Size: 63KB - Virtual size: 63KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 459KB - Virtual size: 459KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ