Static task
static1
Behavioral task
behavioral1
Sample
5ffd4c5e1766196ac1cbd799de829812757684f4432f1b8de59054890997c30d.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
5ffd4c5e1766196ac1cbd799de829812757684f4432f1b8de59054890997c30d.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral3
Sample
win33.exe
Resource
win7-20240508-en
Behavioral task
behavioral4
Sample
win33.exe
Resource
win10v2004-20240611-en
General
-
Target
bd7bad534d1e5a2ad6c11829b96a23e4_JaffaCakes118
-
Size
83KB
-
MD5
bd7bad534d1e5a2ad6c11829b96a23e4
-
SHA1
e49fd66fea962b1e9058fd2cb6b532bd15978b40
-
SHA256
282032b31c4cbaa9110cf95e9f3a838788301bcb4be1a3e9f13d39a737f322e6
-
SHA512
e3970f32b4039b7443c1cfae0ac2dc688ae119b9d483bb02f8180ffcb81143cf997e08fc15b80c1ba853f7dc503a85d6b1d6d8290715aba9bccbac64f1dc22bc
-
SSDEEP
1536:WLppLgamvQNk7fc2pC1bvP45UsgZ0pfZjwESNxbBM8daWYHOXH58KK2Z93j+kjH:WLjUQSrc2CBP4qsfZUE0s8dakZIoL
Malware Config
Signatures
-
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource unpack001/5ffd4c5e1766196ac1cbd799de829812757684f4432f1b8de59054890997c30d unpack001/win33.exe
Files
-
bd7bad534d1e5a2ad6c11829b96a23e4_JaffaCakes118.zip
Password: infected
-
5ffd4c5e1766196ac1cbd799de829812757684f4432f1b8de59054890997c30d.exe windows:4 windows x86 arch:x86
765f762edb487e5bda03dcee4ed321f6
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WideCharToMultiByte
MultiByteToWideChar
WriteFile
SetFilePointer
TerminateProcess
OpenProcess
GetVersionExA
GetSystemInfo
GetModuleHandleA
Process32Next
lstrcatA
HeapFree
HeapAlloc
Process32First
CreateToolhelp32Snapshot
LeaveCriticalSection
EnterCriticalSection
DeleteFileA
GetComputerNameA
SetEvent
Sleep
WaitForSingleObject
lstrlenW
DeleteFileW
CopyFileW
CreateDirectoryW
CreateEventA
VirtualFreeEx
WriteProcessMemory
VirtualAllocEx
lstrlenA
ExitProcess
CreateRemoteThread
DuplicateHandle
CreateProcessW
GetProcessVersion
CreateThread
MapViewOfFile
CreateFileMappingA
InitializeCriticalSection
VirtualQuery
lstrcpyW
GetModuleFileNameW
lstrcatW
GetProcessHeap
GetCurrentProcessId
CreateMutexA
GetCommandLineA
ReadProcessMemory
VirtualQueryEx
lstrcmpA
lstrcmpiA
LockResource
LoadResource
SizeofResource
FindResourceA
GetCurrentDirectoryA
TerminateThread
CreateFileW
ResumeThread
SuspendThread
VirtualFree
SetLastError
CreateFileA
GetLastError
GetFileSize
VirtualAlloc
ReadFile
LoadLibraryA
GetProcAddress
GetCurrentProcess
CloseHandle
lstrcpyA
IsBadReadPtr
GetTickCount
user32
CreateWindowExA
GetMessageA
TranslateMessage
DispatchMessageA
RegisterClassExA
GetSystemMetrics
SetWindowsHookExA
wsprintfA
wsprintfW
DefWindowProcA
advapi32
OpenProcessToken
AdjustTokenPrivileges
RegCloseKey
RegSetValueExA
RegOpenKeyExA
RegQueryValueExA
RegDeleteValueA
GetUserNameA
RegCreateKeyExA
RegSetValueExW
RegNotifyChangeKeyValue
RegDeleteKeyA
LookupPrivilegeValueA
shell32
SHGetFolderPathW
ole32
CoCreateGuid
shlwapi
StrStrA
StrCmpNIA
wininet
HttpSendRequestA
InternetCloseHandle
HttpOpenRequestA
InternetOpenA
InternetGetCookieA
InternetReadFile
InternetOpenUrlA
InternetConnectA
urlmon
ObtainUserAgentString
ws2_32
gethostname
inet_ntoa
gethostbyname
rpcrt4
UuidToStringA
Sections
.text Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 9KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 29KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
win33.exe.exe windows:4 windows x86 arch:x86
765f762edb487e5bda03dcee4ed321f6
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WideCharToMultiByte
MultiByteToWideChar
WriteFile
SetFilePointer
TerminateProcess
OpenProcess
GetVersionExA
GetSystemInfo
GetModuleHandleA
Process32Next
lstrcatA
HeapFree
HeapAlloc
Process32First
CreateToolhelp32Snapshot
LeaveCriticalSection
EnterCriticalSection
DeleteFileA
GetComputerNameA
SetEvent
Sleep
WaitForSingleObject
lstrlenW
DeleteFileW
CopyFileW
CreateDirectoryW
CreateEventA
VirtualFreeEx
WriteProcessMemory
VirtualAllocEx
lstrlenA
ExitProcess
CreateRemoteThread
DuplicateHandle
CreateProcessW
GetProcessVersion
CreateThread
MapViewOfFile
CreateFileMappingA
InitializeCriticalSection
VirtualQuery
lstrcpyW
GetModuleFileNameW
lstrcatW
GetProcessHeap
GetCurrentProcessId
CreateMutexA
GetCommandLineA
ReadProcessMemory
VirtualQueryEx
lstrcmpA
lstrcmpiA
LockResource
LoadResource
SizeofResource
FindResourceA
GetCurrentDirectoryA
TerminateThread
CreateFileW
ResumeThread
SuspendThread
VirtualFree
SetLastError
CreateFileA
GetLastError
GetFileSize
VirtualAlloc
ReadFile
LoadLibraryA
GetProcAddress
GetCurrentProcess
CloseHandle
lstrcpyA
IsBadReadPtr
GetTickCount
user32
CreateWindowExA
GetMessageA
TranslateMessage
DispatchMessageA
RegisterClassExA
GetSystemMetrics
SetWindowsHookExA
wsprintfA
wsprintfW
DefWindowProcA
advapi32
OpenProcessToken
AdjustTokenPrivileges
RegCloseKey
RegSetValueExA
RegOpenKeyExA
RegQueryValueExA
RegDeleteValueA
GetUserNameA
RegCreateKeyExA
RegSetValueExW
RegNotifyChangeKeyValue
RegDeleteKeyA
LookupPrivilegeValueA
shell32
SHGetFolderPathW
ole32
CoCreateGuid
shlwapi
StrStrA
StrCmpNIA
wininet
HttpSendRequestA
InternetCloseHandle
HttpOpenRequestA
InternetOpenA
InternetGetCookieA
InternetReadFile
InternetOpenUrlA
InternetConnectA
urlmon
ObtainUserAgentString
ws2_32
gethostname
inet_ntoa
gethostbyname
rpcrt4
UuidToStringA
Sections
.text Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 9KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 29KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ