Static task
static1
Behavioral task
behavioral1
Sample
DiskActivity.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
DiskActivity.exe
Resource
win10v2004-20240508-en
General
-
Target
3b385248bbd14e902e6ab9f1ba3771ed_JaffaCakes118
-
Size
44KB
-
MD5
3b385248bbd14e902e6ab9f1ba3771ed
-
SHA1
4d5f4d6017704fb7ea0209141f3220fc736d8f95
-
SHA256
396bb0b576c1c77eadd57c706ba888c2b8eae0464f06525f0b7d1be0ac5f7eb2
-
SHA512
f7fc2bdf14baeff70d75e679084a4feeb002509c189261f3c68f8fd77bca9252a1fad86ef343e652ac3045fed27527c535857015a7a7ee30ca9f8b13c6d16101
-
SSDEEP
768:GWGMvT32SYGdFw5bv7tI/NLlnfoMW/YbCXXPpcK3dORn8mAfaAKvDG2UX8QO9HrR:GWGMvl56jQNLlnwMW/YbKXx5wO1fQDU6
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/DiskActivity.exe
Files
-
3b385248bbd14e902e6ab9f1ba3771ed_JaffaCakes118.zip
-
DiskActivity.exe.exe windows:4 windows x86 arch:x86
89e4189ba2f20ba3324768c16f43ddc9
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
MultiByteToWideChar
GetProcAddress
LoadLibraryA
GetVersionExA
GetModuleFileNameA
DeviceIoControl
CreateFileA
FlushFileBuffers
SetStdHandle
FreeLibrary
IsBadReadPtr
SetFilePointer
GetStringTypeW
GetStringTypeA
IsBadWritePtr
VirtualAlloc
WriteFile
VirtualFree
HeapCreate
HeapDestroy
GetEnvironmentVariableA
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
LCMapStringW
LCMapStringA
SetUnhandledExceptionFilter
WaitForSingleObject
CloseHandle
Sleep
WideCharToMultiByte
CreateMutexA
IsBadCodePtr
GetLastError
UnhandledExceptionFilter
SetLastError
TlsAlloc
GetCurrentThreadId
GetOEMCP
GetACP
GetCPInfo
LeaveCriticalSection
ResumeThread
CreateThread
TlsSetValue
TlsGetValue
ExitThread
RtlUnwind
RaiseException
InterlockedDecrement
InterlockedIncrement
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
ExitProcess
HeapFree
TerminateProcess
GetCurrentProcess
HeapReAlloc
HeapAlloc
HeapSize
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
user32
TranslateAcceleratorA
RegisterWindowMessageA
RegisterClassExA
TranslateMessage
DispatchMessageA
LoadAcceleratorsA
GetMessageA
GetDlgItem
IsDlgButtonChecked
GetWindowTextA
SendMessageA
EndDialog
DestroyIcon
CheckDlgButton
SetWindowTextA
SendMessageW
DefWindowProcA
LoadMenuA
GetSubMenu
GetCursorPos
SetForegroundWindow
TrackPopupMenu
PostMessageA
DestroyMenu
DialogBoxParamA
DestroyWindow
PostQuitMessage
CreateWindowExA
ShowWindow
UpdateWindow
LoadImageA
LoadIconA
LoadCursorA
advapi32
RegSetValueExA
RegDeleteValueA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
RegCreateKeyExA
shell32
ExtractIconA
Shell_NotifyIconA
pdh
PdhGetFormattedCounterValue
PdhCollectQueryData
PdhAddCounterW
PdhOpenQueryA
PdhEnumObjectItemsW
PdhLookupPerfNameByIndexW
PdhCloseQuery
Sections
.text Size: 56KB - Virtual size: 54KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 44KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
license.txt
-
readme.txt