Static task
static1
Behavioral task
behavioral1
Sample
Resetter.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
Resetter.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
Resetter.exe
Resource
win7-20240215-en
Behavioral task
behavioral4
Sample
Resetter.exe
Resource
win10v2004-20240426-en
General
-
Target
8298cc9cb96cb2da69c315c22e88654c_JaffaCakes118
-
Size
275KB
-
MD5
8298cc9cb96cb2da69c315c22e88654c
-
SHA1
2a5365fae8d114070b59a71a3710ca710033f530
-
SHA256
4300d77833413a50a0f01a68ffdb7d5f2557a8747e98284fd3ab71954362d6a7
-
SHA512
3e15f3740d8d154b5cdd929f22da37e4d8641dda347b073784c2bb9fe4b2c5c4b5223c7fcc87c099d135ff8547093d2f242aa4aa77eb11cef541d26a3468b710
-
SSDEEP
6144:WhxMv3GWyFZNx5HprtQeFerE18DtH7BbewMxxOVwmL:WhxMvWWy9HB7FEF7FevxidL
Malware Config
Signatures
-
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource unpack001/Resetter.dll unpack001/Resetter.exe
Files
-
8298cc9cb96cb2da69c315c22e88654c_JaffaCakes118.zip
-
Resetter.dll.exe windows:5 windows x86 arch:x86
c1444472380fabe5bd48c667e864d280
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
setupapi
SetupDiGetClassDevsA
SetupDiEnumDeviceInterfaces
SetupDiOpenDeviceInterfaceRegKey
SetupDiGetDeviceInterfaceDetailA
SetupDiDestroyDeviceInfoList
kernel32
GetTickCount
RtlUnwind
HeapFree
GetSystemTimeAsFileTime
HeapAlloc
GetCommandLineA
GetStartupInfoA
ExitProcess
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
HeapReAlloc
SetStdHandle
GetFileType
ExitThread
CreateThread
HeapSize
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsValidCodePage
LCMapStringW
HeapCreate
HeapDestroy
VirtualFree
GetTimeZoneInformation
SetHandleCount
GetStdHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
InitializeCriticalSectionAndSpinCount
GetConsoleCP
GetConsoleMode
GetStringTypeA
GetStringTypeW
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CompareStringW
SetEnvironmentVariableA
WritePrivateProfileStringA
SetErrorMode
GetFileTime
GetFileSizeEx
FileTimeToLocalFileTime
FileTimeToSystemTime
GetModuleHandleW
GetOEMCP
GetCPInfo
InterlockedIncrement
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
GlobalHandle
GlobalReAlloc
TlsGetValue
GlobalFlags
InterlockedDecrement
GetModuleFileNameW
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesA
GetFullPathNameA
FindFirstFileA
FindClose
GetCurrentProcess
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
SuspendThread
SetEvent
ResumeThread
SetThreadPriority
GetCurrentProcessId
GetModuleFileNameA
FormatMessageA
MulDiv
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
CompareStringA
SetLastError
MultiByteToWideChar
lstrcmpW
GetModuleHandleA
GlobalLock
GlobalUnlock
FreeResource
RaiseException
LoadLibraryA
FreeLibrary
GetProcAddress
LocalAlloc
CreateEventA
FindResourceExA
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
GetFileAttributesA
GetSystemTime
lstrcpynA
GetComputerNameA
lstrcpyA
GetWindowsDirectoryA
GetVolumeInformationA
CreateDirectoryA
LocalFree
SetFileAttributesA
ReadFile
CreateFileA
WriteFile
SystemTimeToFileTime
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
DeviceIoControl
GetOverlappedResult
ResetEvent
CancelIo
lstrlenA
IsDebuggerPresent
CreateProcessA
GlobalAlloc
GlobalFree
WaitForSingleObject
GetVersionExA
CreateMutexA
GetLastError
ReleaseMutex
CloseHandle
Sleep
lstrcmpA
WideCharToMultiByte
FindResourceA
LoadResource
LockResource
SizeofResource
LCMapStringA
GetProcessHeap
user32
UnregisterClassA
GetNextDlgGroupItem
InvalidateRgn
IsRectEmpty
CopyAcceleratorTableA
CharNextA
SetRect
MessageBeep
ReleaseCapture
SetCapture
InvalidateRect
LoadCursorA
GetSysColorBrush
SetWindowContextHelpId
MapDialogRect
SetCursor
PostQuitMessage
CharUpperA
DestroyMenu
GetMessageA
TranslateMessage
GetCursorPos
ValidateRect
GetWindowThreadProcessId
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
ModifyMenuA
CheckMenuItem
EndPaint
BeginPaint
GetWindowDC
ReleaseDC
GetDC
ClientToScreen
GrayStringA
DrawTextExA
TabbedTextOutA
GetMenuState
RegisterWindowMessageA
WinHelpA
IsChild
GetCapture
SetWindowsHookExA
GetClassLongA
SetPropA
GetPropA
RemovePropA
GetForegroundWindow
GetLastActivePopup
DispatchMessageA
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
PeekMessageA
MapWindowPoints
GetKeyState
SetMenu
IsWindowVisible
UpdateWindow
GetSubMenu
GetMenuItemID
GetMenuItemCount
SendMessageA
EnableWindow
GetFocus
GetAsyncKeyState
GetDlgCtrlID
GetClassNameA
MessageBoxA
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
GetSysColor
AdjustWindowRectEx
EqualRect
CopyRect
PtInRect
DefWindowProcA
CallWindowProcA
GetMenu
IntersectRect
SystemParametersInfoA
GetWindowPlacement
GetWindowRect
GetWindowTextLengthA
GetWindowTextA
SetWindowPos
SetFocus
PostThreadMessageA
ShowWindow
MoveWindow
RegisterClipboardFormatA
CallNextHookEx
EnableMenuItem
PostMessageA
GetSystemMenu
GetParent
GetActiveWindow
FindWindowA
SetForegroundWindow
OffsetRect
DrawIcon
AppendMenuA
IsIconic
GetClientRect
LoadIconA
GetSystemMetrics
wsprintfA
EndDialog
GetNextDlgTabItem
IsWindowEnabled
GetDlgItem
GetWindowLongA
IsWindow
DestroyWindow
CreateDialogIndirectParamA
SetActiveWindow
GetDesktopWindow
GetWindow
CheckRadioButton
SendDlgItemMessageA
IsDialogMessageA
SetWindowTextA
SetWindowLongA
DrawTextA
gdi32
CreateRectRgnIndirect
GetMapMode
GetBkColor
GetTextColor
GetRgnBox
GetStockObject
CreateBitmap
DeleteDC
ExtSelectClipRgn
ScaleViewportExtEx
ScaleWindowExtEx
SetWindowExtEx
GetObjectA
SetBkColor
SetTextColor
GetClipBox
CreateFontIndirectA
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetWindowExtEx
GetViewportExtEx
DeleteObject
SetMapMode
RestoreDC
SaveDC
GetDeviceCaps
comdlg32
GetFileTitleA
winspool.drv
OpenPrinterA
ClosePrinter
EnumPortsA
DocumentPropertiesA
advapi32
CryptHashData
RegQueryValueA
RegEnumKeyA
RegDeleteKeyA
RegOpenKeyA
GetUserNameA
CryptAcquireContextA
CryptCreateHash
RegCloseKey
CryptGetHashParam
CryptDestroyHash
CryptReleaseContext
ConvertStringSecurityDescriptorToSecurityDescriptorA
RegSetValueExA
RegOpenKeyExA
RegQueryValueExA
RegCreateKeyExA
shell32
SHGetSpecialFolderPathA
comctl32
ord17
shlwapi
PathFindExtensionA
PathStripToRootA
PathIsUNCA
PathAppendA
PathRemoveFileSpecW
PathFindFileNameA
oledlg
ord8
ole32
OleInitialize
CoFreeUnusedLibraries
OleUninitialize
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoGetClassObject
CLSIDFromString
CLSIDFromProgID
CoInitializeEx
CoRevokeClassObject
CoUninitialize
CoTaskMemAlloc
CoTaskMemFree
OleIsCurrentClipboard
OleFlushClipboard
CoRegisterMessageFilter
CoCreateInstance
oleaut32
SysFreeString
VariantClear
VariantChangeType
VariantInit
SysAllocStringLen
SysStringLen
SysAllocStringByteLen
VariantCopy
SafeArrayDestroy
VariantTimeToSystemTime
SystemTimeToVariantTime
OleCreateFontIndirect
SysAllocString
Sections
.text Size: 425KB - Virtual size: 425KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 78KB - Virtual size: 77KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 60KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 50KB - Virtual size: 49KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
Resetter.exe.exe windows:4 windows x86 arch:x86
bff983b5fa21bb8c13bf11543e08f6bd
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
MessageBoxA
kernel32
ExitProcess
ExpandEnvironmentStringsA
FindResourceA
GetCommandLineA
GetFileSize
GetModuleFileNameA
GetModuleHandleA
GetPrivateProfileStringA
GetTempPathA
LoadResource
MapViewOfFile
ReadFile
ReadProcessMemory
ResumeThread
RtlMoveMemory
SetEnvironmentVariableA
SizeofResource
DeleteFileA
TerminateProcess
UnmapViewOfFile
VirtualAlloc
VirtualFree
VirtualProtectEx
WritePrivateProfileStringA
WriteProcessMemory
lstrcatA
lstrcmpA
lstrcmpiA
lstrcpyA
lstrlenA
CreateProcessA
CreateFileMappingA
FindClose
FindFirstFileA
FlushFileBuffers
WriteFile
SetCurrentDirectoryA
CreateFileA
CloseHandle
Sleep
shell32
ShellExecuteA
advapi32
RegCreateKeyExA
RegCloseKey
RegQueryValueExA
RegOpenKeyA
comdlg32
GetOpenFileNameA
Sections
.text Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 61KB - Virtual size: 60KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ