Behavioral task
behavioral1
Sample
155��ɫ����վ.url
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
155��ɫ����վ.url
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
aspmkr.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
aspmkr.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral5
Sample
keygen/Keygen.exe
Resource
win7-20231129-en
Behavioral task
behavioral6
Sample
keygen/Keygen.exe
Resource
win10v2004-20240611-en
General
-
Target
1974987421343c5c38e656a306950b68_JaffaCakes118
-
Size
12.0MB
-
MD5
1974987421343c5c38e656a306950b68
-
SHA1
5deeec7219a663a6592ecb08aabf1e1d61b54ce5
-
SHA256
a5318f05ed56fb65151c7f78207c071bc81b0d822effbb5f771da4a12b906850
-
SHA512
182681e100f6c5d7d5ee95565c8d715f9186b618b99eaab7566b65115f770ca96260b42fe0272abfdd8165701c6fa6f7b7082c25f98a59e9f4dcf2772c0f4877
-
SSDEEP
196608:EliD7tZ3/8aiuJnTjW+X9Qv7488+wcJJRNeWulBE+Peb4z7lEoUaVZYSsba3nW/z:ElivtR8ai8nVc740wUU/2opLYfm3Kz
Malware Config
Signatures
-
resource yara_rule static1/unpack001/keygen/Keygen.exe upx -
Unsigned PE 3 IoCs
Checks for missing Authenticode signature.
resource unpack001/aspmkr.exe unpack001/keygen/Keygen.exe unpack002/out.upx
Files
-
1974987421343c5c38e656a306950b68_JaffaCakes118.zip
-
155��ɫ����վ.url.url
-
aspmkr.exe.exe windows:4 windows x86 arch:x86
d2c82993d1a616abe994cabd5db7b4f8
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetUnhandledExceptionFilter
lstrcmpiA
lstrcpyA
lstrlenA
_lclose
GetModuleFileNameA
_lread
_llseek
_lopen
_lwrite
_lcreat
CreateDirectoryA
SetCurrentDirectoryA
lstrcatA
FreeLibrary
GetProcAddress
LoadLibraryA
GetDiskFreeSpaceA
UnhandledExceptionFilter
RemoveDirectoryA
DeleteFileA
GetTempPathA
GetCurrentDirectoryA
CloseHandle
GetExitCodeProcess
LocalFree
Sleep
HeapSize
RtlUnwind
LCMapStringW
LCMapStringA
GetStringTypeW
GetCurrentProcess
GetFileAttributesA
TerminateProcess
MultiByteToWideChar
GetStringTypeA
GetModuleHandleA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
GetLastError
InterlockedDecrement
ExitProcess
HeapFree
HeapAlloc
GetCommandLineA
GetVersionExA
GetProcessHeap
GetStartupInfoA
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
WriteFile
GetStdHandle
InitializeCriticalSection
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetLocaleInfoA
user32
TranslateMessage
DispatchMessageA
PeekMessageA
wsprintfA
LoadCursorA
SetCursor
MessageBoxA
MsgWaitForMultipleObjects
advapi32
GetTokenInformation
OpenProcessToken
shell32
ShellExecuteExA
Sections
.text Size: 32KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
keygen/Keygen.exe.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 1.2MB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 129KB - Virtual size: 132KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 9KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 40KB - Virtual size: 40KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 1.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 197KB - Virtual size: 197KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
note.txt