Static task
static1
Behavioral task
behavioral1
Sample
714921002E85023-66881077744915S06667-Verrechnung.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
714921002E85023-66881077744915S06667-Verrechnung.exe
Resource
win10v2004-20240508-en
General
-
Target
310134517aad106d970af4a9bcd09348_JaffaCakes118
-
Size
631KB
-
MD5
310134517aad106d970af4a9bcd09348
-
SHA1
425ff8929366115392c1c419d2a6e5ffdb8755a2
-
SHA256
d3e266184dd2675254fc7ec4784c5c99a1817d59630e780b0f92362abf15305a
-
SHA512
245328c02f4bb59388c5778be0feb54f840d82d619ca4d3088a7a8a5945b749da8cceb35721fe2441834effc149edf8dd953cb0d693ad3cdddf251fc15a7f487
-
SSDEEP
12288:rjS0dIrOy00fhPTxP1Xp6b0EaF7kiOcSPEpjw/CDsY62fF8XhrN7mG0dW:rjS00h00p719p9Ea/hSPE1w6F6UFG5Nd
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource unpack001/714921002E85023-66881077744915S06667-Verrechnung.com
Files
-
310134517aad106d970af4a9bcd09348_JaffaCakes118.zip
-
714921002E85023-66881077744915S06667-Verrechnung.com.exe windows:5 windows x86 arch:x86
34a3af20cd2471a34a59c488a28ab86d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
IsDialogMessageW
GetPropA
LoadIconA
CharToOemW
LoadCursorW
MessageBoxA
PostMessageW
GetClassLongW
IsCharLowerW
PeekMessageA
GetDlgItemTextW
LoadBitmapA
kernel32
ReadFile
GetVersionExA
GetTickCount
LoadLibraryW
GetFileAttributesW
CreateProcessA
SetLastError
LoadLibraryA
HeapAlloc
VirtualAllocEx
OpenFileMappingW
LocalFileTimeToFileTime
CreateSemaphoreW
SleepEx
FindResourceExA
OpenSemaphoreA
SetCurrentDirectoryA
WriteConsoleW
CopyFileW
nddeapi
NDdeShareSetInfoA
NDdeShareDelA
NDdeShareEnumA
Sections
.text Size: 648KB - Virtual size: 647KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ