Static task
static1
Behavioral task
behavioral1
Sample
Hack Tools 6.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Hack Tools 6.exe
Resource
win10v2004-20240709-en
General
-
Target
72a327480104103327ab871a84d66e0e_JaffaCakes118
-
Size
472KB
-
MD5
72a327480104103327ab871a84d66e0e
-
SHA1
750d53dcc645c511ab54b2368c1d4c945ca08882
-
SHA256
5663b2286b7717e92f665103eef283ed4ea0901a618526a0cde3334b46960443
-
SHA512
f1475470c04ab72e56fb6af64804e645ea60eacd387300a1e78a02e22539d8f021f901ac016febf927f971e22eedcef1c3dfe09388cf2bca09194249a1982356
-
SSDEEP
12288:TzUp8yRm9QPLnZ6QTeccndsM1JEEZOav00m1t:TC/mGPtSBdX1a4sJ1t
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/Hack Tools 6.exe
Files
-
72a327480104103327ab871a84d66e0e_JaffaCakes118.rar
-
Hack Tools 6.exe.exe windows:4 windows x86 arch:x86
18a8f1cc88bfbadd72d06bfd1a86f94c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
MultiByteToWideChar
GetFileAttributesA
WaitForSingleObject
GetCurrentDirectoryA
GetPrivateProfileStringA
GetTempPathA
GetModuleFileNameA
SetCurrentDirectoryA
SetFileAttributesA
CloseHandle
GetLastError
SetFileTime
LocalFileTimeToFileTime
SystemTimeToFileTime
WriteFile
CreateFileA
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
DeleteFileA
GetStringTypeW
GetFullPathNameA
GetDriveTypeA
RtlUnwind
CreateDirectoryA
ExitProcess
TerminateProcess
GetCurrentProcess
HeapAlloc
HeapFree
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
SetFilePointer
SetHandleCount
GetStdHandle
GetFileType
ReadFile
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
IsBadWritePtr
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetStdHandle
FlushFileBuffers
SetUnhandledExceptionFilter
IsBadReadPtr
IsBadCodePtr
GetCPInfo
GetACP
GetOEMCP
GetProcAddress
LoadLibraryA
SetEndOfFile
LCMapStringA
LCMapStringW
GetStringTypeA
user32
GetDlgItem
SetWindowTextA
EndDialog
LoadIconA
UpdateWindow
LoadImageA
DialogBoxParamA
MessageBoxA
SendMessageA
GetWindowTextA
shell32
ShellExecuteExA
ShellExecuteA
SHGetDesktopFolder
SHGetMalloc
SHBrowseForFolderA
SHGetPathFromIDListA
Sections
.text Size: 52KB - Virtual size: 48KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ