teeeDDDDDDDGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGG3333333333333
Behavioral task
behavioral1
Sample
629fba91ff579f1e890e489a028d7eb1_JaffaCakes118.exe
Resource
win7-20240508-en
General
-
Target
629fba91ff579f1e890e489a028d7eb1_JaffaCakes118
-
Size
32KB
-
MD5
629fba91ff579f1e890e489a028d7eb1
-
SHA1
c6871d6ce30d012e79412761bd6c0c75be37d084
-
SHA256
6cda2e78e02e7b2d195868d9d47a127e4b7dedd76c95f7f44d5b7fc8ac485078
-
SHA512
5e5786f841a6581879c929374e848d55525ad73e136fbb8690c5d89587c431ef60c2f666203bb216cd8271fc27274119025e315156cb7b24cf1bb4d59f611183
-
SSDEEP
384:UOFl9ooXxUDs/uG67GRtA2ZmQF1szUQIENIay2vWpQVGq71BV7ISlDqzhr1zFz:U0l9GDs/uGTNnggERZBV7VWzFDz
Malware Config
Extracted
phorphiex
http://worm.ws/
http://seuufhehfueugheh.ws/
http://feuhdeuhduhuehdh.ws/
http://feauhueudughuurh.ws/
http://fheuhdwdzwgzdggh.ws/
http://faugzeazdezgzgfh.ws/
http://wduufbaueeubffgh.ws/
http://okdoekeoehghaoeh.ws/
http://efuheruhdehduhgh.ws/
http://eafueudzefverrgh.ws/
http://deauduafzgezzfgh.ws/
http://gaueudbuwdbuguuh.ws/
http://efeuafubeubaefuh.ws/
http://eafuebdbedbedggh.ws/
http://wdkowdohwodhfhfh.ws/
http://efaeduvedvzfufuh.ws/
http://edhuaudhuedugufh.ws/
http://eaffuebudbeudbbh.ws/
http://seuufhehfueughet.to/
http://feuhdeuhduhuehdt.to/
http://feauhueudughuurt.to/
http://fheuhdwdzwgzdggt.to/
http://faugzeazdezgzgft.to/
http://wduufbaueeubffgt.to/
http://okdoekeoehghaoet.to/
http://efuheruhdehduhgt.to/
http://eafueudzefverrgt.to/
http://deauduafzgezzfgt.
19KXPyopGnfZ1dGjLpPPqbo7Jpqki9A9mW
3NShfYPbqkPmPkXEgJ1SGUYgSjxt1Robhs
bc1qf4awd7k76q0tks25ax7q48wmsvslvy64er6n6w
qqe5entlms8sudv7a60dnu5gpttlukmspuk5zxsahe
XjgwEqD6iFf5pHxqSzj4tm8mgs7TsS2kEw
DHvsojZJPxoYYwtVw7voSuv2ga5LGoQpG1
0xA557fe5c21325eB8f6C7d5f2004Db988c8C8D8B5
LYr5qEmeAcpv7JeCEE2HfGPV74DZLYHeT2
42TCgxVg6itTv4v8dvyCQEETmHL5N6i8a8rvcqGWb2QtWUrBpq3SdDnZbhpcg2S3UbNG98Woi6KEH7dWtpnEHQrDEzQbENy
rDs45wyGR5E6sHajNGHeNqvjvXaCJrJ22j
TY59jfEA2xQBk4R8AAJG3tBGQybMm1aSba
t1NBaHW8QgULABaASvzNALmxem8EutnxLtr
GDR62FPKRATKXTLSR3JDCVGDAVF6YC5RVZ2RQ55SNW6C2UWND3KGUHPW
P44ZCLTNESUGZESVC3QMK6LSFY7LYW3N23FKX56UMCEXK6NZBG3BUNPDWI
Signatures
-
Phorphiex family
-
Phorphiex payload 1 IoCs
Processes:
resource yara_rule sample family_phorphiex -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 629fba91ff579f1e890e489a028d7eb1_JaffaCakes118
Files
-
629fba91ff579f1e890e489a028d7eb1_JaffaCakes118.exe windows:5 windows x86 arch:x86
2f944c0518d3a00049e07094b78bdb20
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
msvcrt
memcpy
_controlfp
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
wcsstr
wcslen
wcscmp
_wfopen
fseek
ftell
fclose
mbstowcs
srand
rand
memset
strlen
isalpha
isdigit
wininet
HttpQueryInfoA
InternetOpenA
InternetOpenUrlA
InternetOpenW
InternetOpenUrlW
InternetReadFile
InternetCloseHandle
urlmon
URLDownloadToFileW
shlwapi
StrCmpNW
PathFileExistsW
PathFindFileNameW
PathMatchSpecW
kernel32
CopyFileW
lstrcmpiW
CreateDirectoryW
FindFirstFileW
lstrcmpW
MoveFileExW
SetFileAttributesW
FindClose
RemoveDirectoryW
GetLogicalDrives
GetDriveTypeW
QueryDosDeviceW
lstrcpyW
GetTickCount
GetVolumeInformationW
GetModuleFileNameW
CreateProcessW
CreateThread
ExitProcess
GetLastError
CreateMutexA
MoveFileW
CopyFileA
MoveFileA
DeleteFileA
GetModuleHandleA
GetStartupInfoA
FindNextFileW
GlobalUnlock
GlobalLock
GlobalAlloc
ExitThread
Sleep
SetEndOfFile
SetFilePointer
CloseHandle
UnmapViewOfFile
HeapFree
HeapAlloc
GetProcessHeap
MapViewOfFile
CreateFileMappingA
GetFileSize
CreateFileW
DeleteFileW
WriteFile
ExpandEnvironmentStringsW
user32
SetFocus
SetForegroundWindow
ShowWindow
CloseWindow
SetClipboardData
CloseClipboard
FindWindowA
wsprintfA
wsprintfW
EmptyClipboard
GetClipboardData
OpenClipboard
FindWindowW
advapi32
CryptAcquireContextW
CryptDestroyKey
CryptImportKey
CryptVerifySignatureA
CryptHashData
CryptCreateHash
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
RegEnumValueW
RegQueryInfoKeyW
RegCreateKeyExA
RegSetValueExA
RegOpenKeyExA
RegSetValueExW
CryptEncrypt
shell32
ShellExecuteW
ole32
CoInitializeEx
CoCreateInstance
Sections
.text Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 980B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 436B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ