Static task
static1
Behavioral task
behavioral1
Sample
antiarp4.1.1.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
antiarp4.1.1.exe
Resource
win10v2004-20240508-en
General
-
Target
07563b848c8a666cc9040ea3b47b5fb4_JaffaCakes118
-
Size
2.4MB
-
MD5
07563b848c8a666cc9040ea3b47b5fb4
-
SHA1
b4c5df265fa15478a9cb08c160234112590cbaad
-
SHA256
5077f3fec8e8634397b6584b5cb5f5a430d1b25b9dc38b86c2eeacc829167cfd
-
SHA512
79af861a13a2be457ac58fa88b62c20ce49dedd9900c572dc7aa1cbfa52b034922f6689b5c9b28a6a4b00b500de74e1df9b970f52cbbe874d54f3be89911c7ca
-
SSDEEP
49152:2sHG0wcJp0qYruDyomiiH8KrCr5JuBuBSLS344IK/ZcsLnXRDenTQ:PHGyzEuD8ifKrOnYZrt1sLXJeTQ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/antiarp4.1.1.exe
Files
-
07563b848c8a666cc9040ea3b47b5fb4_JaffaCakes118.rar
-
antiarp4.1.1.exe.exe windows:4 windows x86 arch:x86
e87025fcd864e8993cf0bd2178ec9f5a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
version
GetFileVersionInfoA
VerQueryValueA
GetFileVersionInfoSizeA
wininet
InternetCloseHandle
InternetOpenA
InternetOpenUrlA
HttpQueryInfoA
InternetSetFilePointer
InternetReadFile
kernel32
GetLastError
RaiseException
DeleteCriticalSection
InitializeCriticalSection
InterlockedExchange
GetACP
GetLocaleInfoA
GetThreadLocale
GetVersionExA
WideCharToMultiByte
FindResourceA
SizeofResource
LockResource
LoadResource
FindResourceExA
GetCurrentProcess
FlushInstructionCache
GetCurrentThreadId
MulDiv
LeaveCriticalSection
EnterCriticalSection
GetProcessHeap
HeapFree
HeapAlloc
ResetEvent
SetEvent
CloseHandle
WaitForSingleObject
CreateEventA
CreateThread
GetSystemTime
CreateFileA
GetFileSize
SetFilePointer
WriteFile
FlushFileBuffers
GetDiskFreeSpaceA
FreeLibrary
GetModuleFileNameA
DeleteFileA
ReadFile
GetTempPathA
GetExitCodeProcess
lstrcmpA
GetVersion
GetPrivateProfileStringA
FindFirstFileA
FindClose
GetTempFileNameA
lstrlenA
FindNextFileA
GetSystemDirectoryA
GetWindowsDirectoryA
InterlockedIncrement
InterlockedDecrement
IsDBCSLeadByte
lstrcmpiA
lstrcpynA
LoadLibraryExA
MultiByteToWideChar
lstrlenW
GetProcAddress
LoadLibraryA
QueryPerformanceCounter
HeapDestroy
HeapReAlloc
HeapSize
DebugBreak
ExitProcess
GetStartupInfoA
GetCommandLineA
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
lstrcatA
lstrcpyA
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
GetModuleHandleA
RtlUnwind
user32
IsDialogMessageA
EnableWindow
SetFocus
LoadStringA
CreateDialogParamA
DefWindowProcA
IsWindowVisible
ShowWindow
MapWindowPoints
SetWindowLongA
CreateWindowExA
IsWindow
DestroyWindow
GetWindowLongA
EndDialog
DialogBoxParamA
CallWindowProcA
GetSystemMetrics
LoadImageA
CharNextA
PostMessageA
GetActiveWindow
SendMessageA
MessageBoxA
SetWindowTextA
GetClientRect
GetWindow
SystemParametersInfoA
GetParent
SetWindowPos
InvalidateRect
GetWindowRect
GetDlgItem
UnregisterClassA
wvsprintfA
RedrawWindow
advapi32
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
RegCloseKey
RegDeleteValueA
RegEnumKeyExA
RegDeleteKeyA
RegQueryInfoKeyA
RegCreateKeyExA
shell32
SHGetMalloc
SHGetPathFromIDListA
SHBrowseForFolderA
ShellExecuteA
ShellExecuteExA
SHGetSpecialFolderLocation
ole32
CoTaskMemFree
CoTaskMemRealloc
CoTaskMemAlloc
CoCreateInstance
CoUninitialize
CoInitialize
oleaut32
VarUI4FromStr
comctl32
DestroyPropertySheetPage
PropertySheetA
CreatePropertySheetPageA
Sections
.text Size: 52KB - Virtual size: 48KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 740B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ