Behavioral task
behavioral1
Sample
MACList.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
MACList.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral3
Sample
ModiIP.exe
Resource
win7-20240220-en
Behavioral task
behavioral4
Sample
ModiIP.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral5
Sample
tftpd32.exe
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
tftpd32.exe
Resource
win10v2004-20240704-en
General
-
Target
2af0fb9708dccaa0d42442cacf05e3da_JaffaCakes118
-
Size
255KB
-
MD5
2af0fb9708dccaa0d42442cacf05e3da
-
SHA1
92b9c395713c50b97a9498e9f7f8222d1654186b
-
SHA256
694b83c7f013b2c0bc2c54ab53e86ac367a2e0422e9ea285d6a39635c09d50f7
-
SHA512
9a83751e5cfed2086046580f41d367e57bb5a388703d805e8e510247dd8e778caca93e06212ba782f30e372c136d1d620f5c26d219dbaf6838e60ea4b6771ccd
-
SSDEEP
6144:Mv9glNTkHC2PS3zurFb3PgThAM7WRamci34of:igoHfPSjuxLguM7kammof
Malware Config
Signatures
-
resource yara_rule static1/unpack001/MACList.exe upx static1/unpack001/ModiIP.exe upx -
Unsigned PE 5 IoCs
Checks for missing Authenticode signature.
resource unpack001/MACList.exe unpack002/out.upx unpack001/ModiIP.exe unpack003/out.upx unpack001/tftpd32.exe
Files
-
2af0fb9708dccaa0d42442cacf05e3da_JaffaCakes118.rar
-
MACList.exe.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
UPX0 Size: - Virtual size: 80KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 29KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 27KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
CODE Size: 51KB - Virtual size: 50KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
DATA Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BSS Size: - Virtual size: 1KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: - Virtual size: 8B
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 27KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
ModiIP.exe.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
UPX0 Size: - Virtual size: 76KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 25KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
CODE Size: 46KB - Virtual size: 45KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
DATA Size: 1024B - Virtual size: 592B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BSS Size: - Virtual size: 1KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: - Virtual size: 8B
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 23KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
TFTPD32.HLP
-
tftp32.reg
-
tftpd32.exe.exe windows:4 windows x86 arch:x86
befc7539848a0574dda4b5a412ed092e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
wsock32
WSAGetLastError
ioctlsocket
ntohl
htonl
WSACleanup
WSAStartup
WSAAsyncGetHostByName
WSAIsBlocking
WSACancelBlockingCall
connect
getsockname
recv
send
ntohs
WSAAsyncSelect
inet_addr
WSASetLastError
select
gethostbyname
closesocket
recvfrom
gethostname
sendto
socket
getservbyname
setsockopt
bind
htons
comctl32
InitCommonControlsEx
iphlpapi
SendARP
kernel32
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
GetConsoleMode
GetConsoleCP
LoadLibraryA
RtlUnwind
InitializeCriticalSection
GetCurrentProcessId
QueryPerformanceCounter
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
lstrlenA
CloseHandle
GetFileSize
CreateFileA
GetLastError
GetCurrentThreadId
lstrcmpA
lstrcpyA
Sleep
lstrcatA
lstrcpynA
GetCurrentDirectoryA
SetEnvironmentVariableA
LocalFree
FormatMessageA
GlobalUnlock
GlobalLock
GlobalAlloc
GetTickCount
GetPrivateProfileStringA
WritePrivateProfileStringA
ReleaseMutex
WaitForSingleObject
CreateMutexA
GetSystemTime
SetFilePointer
GetLocalTime
WriteFile
SetLastError
lstrcmpiA
ReadFile
SetThreadPriority
ReleaseSemaphore
SetEvent
CreateSemaphoreA
CreateEventA
HeapSize
DeleteFileA
SetCurrentDirectoryA
GetFileAttributesA
CreateProcessA
FindClose
FindNextFileA
GetDateFormatA
FileTimeToSystemTime
FileTimeToLocalFileTime
FindFirstFileA
SetProcessWorkingSetSize
GetCurrentProcess
GetEnvironmentVariableA
GetModuleFileNameA
MultiByteToWideChar
LCMapStringA
GetOEMCP
GetACP
GetCPInfo
GetFullPathNameA
InterlockedDecrement
InterlockedIncrement
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetStdHandle
ExitProcess
GetModuleHandleA
GetProcAddress
HeapCreate
HeapDestroy
VirtualAlloc
VirtualFree
EnterCriticalSection
LCMapStringW
LeaveCriticalSection
DeleteCriticalSection
GetTimeZoneInformation
WideCharToMultiByte
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
GetStartupInfoA
GetProcessHeap
GetVersionExA
GetCommandLineA
GetDriveTypeA
HeapReAlloc
CreateThread
ResumeThread
ExitThread
HeapFree
HeapAlloc
GetSystemTimeAsFileTime
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CompareStringA
FreeEnvironmentStringsA
GetEnvironmentStrings
CompareStringW
TerminateThread
FlushFileBuffers
user32
MapDialogRect
GetClientRect
GetTopWindow
DialogBoxParamA
CreateWindowExA
RegisterClassA
GetClassInfoA
SetCursor
InvalidateRect
SetClassLongA
GetSystemMenu
AppendMenuA
CheckMenuItem
GetSystemMetrics
SetForegroundWindow
GetWindow
WinHelpA
CreateDialogParamA
MoveWindow
UnregisterClassA
FindWindowA
IsWindow
DestroyIcon
LoadIconA
LoadCursorA
GetDC
ReleaseDC
EnableWindow
SendDlgItemMessageA
EndDialog
DestroyWindow
MessageBeep
GetWindowTextA
SetWindowTextA
GetDialogBaseUnits
SetWindowLongA
GetFocus
ShowWindow
CallWindowProcA
OpenClipboard
EmptyClipboard
SetClipboardData
CloseClipboard
wvsprintfA
SetWindowsHookExA
UnhookWindowsHookEx
IsWindowVisible
GetWindowRect
SystemParametersInfoA
SetWindowPos
SetDlgItemTextA
SetDlgItemInt
GetDlgItemInt
GetDlgItemTextA
KillTimer
SetTimer
DefWindowProcA
GetWindowLongA
LoadMenuA
GetCursorPos
GetSubMenu
TrackPopupMenu
DestroyMenu
GetParent
GetDlgItem
SendMessageA
PostMessageA
wsprintfA
MessageBoxA
gdi32
LPtoDP
GetTextExtentPoint32A
comdlg32
GetOpenFileNameA
advapi32
RegQueryValueExA
RegOpenKeyExA
RegSetValueExA
RegDeleteKeyA
RegCreateKeyExA
shell32
DragAcceptFiles
DragQueryFileA
DragFinish
SHBrowseForFolderA
SHGetPathFromIDListA
Shell_NotifyIconA
Sections
.text Size: 108KB - Virtual size: 106KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 57KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ