Behavioral task
behavioral1
Sample
6a234f3e81dc0ce808ed0cd7d38e3be4JaffaCakes118.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
6a234f3e81dc0ce808ed0cd7d38e3be4JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
6a234f3e81dc0ce808ed0cd7d38e3be4JaffaCakes118
-
Size
54KB
-
MD5
6a234f3e81dc0ce808ed0cd7d38e3be4
-
SHA1
21e821d3d81c398ad4e8d749b713cc8768969628
-
SHA256
d7c7947d060da8f4207e7e919e8f777f6f8ea475085291d5a547546a39a096fc
-
SHA512
62232eaa55bee362874de4c388e9c443c592d07ad2fd114159f994a32bd391dc34c0362c08c19a2ea62e76dcfa6b2c33e7dd15fdd25d6e4156401d4245fc2ac3
-
SSDEEP
768:OnJr+Opk+ptC7j/zz6GGGqoSEr3e8TDPF+87IKdNMAkRj7kT/x:aS10ty2XGy0T7BdERjk
Malware Config
Signatures
-
Detected Netwalker Ransomware 1 IoCs
Detected unpacked Netwalker executable.
Processes:
resource yara_rule sample netwalker_ransomware -
Netwalker family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 6a234f3e81dc0ce808ed0cd7d38e3be4JaffaCakes118
Files
-
6a234f3e81dc0ce808ed0cd7d38e3be4JaffaCakes118.exe windows:6 windows x86 arch:x86
5b31ac8cdf313aa6e4513e902c6f0c0f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleW
GetProcAddress
LoadLibraryA
lstrcpyA
lstrcpyW
lstrcatW
CreateFileW
GetFileAttributesW
GetFileSizeEx
ReadFile
SetEndOfFile
SetFileAttributesW
SetFilePointerEx
WriteFile
CloseHandle
GetCommandLineW
FindClose
FindFirstFileW
GetProcessHeap
GetLogicalDriveStringsW
SetErrorMode
WaitForMultipleObjects
ExitProcess
CreateThread
GetComputerNameExW
LoadResource
LockResource
SizeofResource
lstrcmpW
lstrcmpiW
lstrlenW
FindResourceA
GetFileSize
DeleteFileW
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
MultiByteToWideChar
HeapFree
HeapReAlloc
FindNextFileW
HeapAlloc
user32
EnableWindow
GetSystemMetrics
UpdateWindow
SetActiveWindow
SetWindowTextA
SetWindowTextW
DestroyWindow
IsDlgButtonChecked
MessageBoxW
LoadCursorW
CreateWindowExW
TranslateMessage
GetMessageW
wsprintfW
RegisterClassW
CheckDlgButton
SetWindowPos
GetWindowRect
ShowWindow
PostQuitMessage
DefWindowProcW
SendMessageW
GetWindowTextW
DispatchMessageW
gdi32
CreateFontW
comdlg32
GetOpenFileNameW
shell32
SHGetPathFromIDListW
CommandLineToArgvW
SHBrowseForFolderW
mpr
WNetUseConnectionW
WNetAddConnection2W
WNetOpenEnumW
WNetCloseEnum
WNetEnumResourceW
Sections
.text Size: 46KB - Virtual size: 45KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ