Static task
static1
Behavioral task
behavioral1
Sample
12backup.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
12backup.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
新云软件.url
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
新云软件.url
Resource
win10v2004-20240802-en
General
-
Target
88efc5002884bdc7a64eb2d745c1f7fe_JaffaCakes118
-
Size
714KB
-
MD5
88efc5002884bdc7a64eb2d745c1f7fe
-
SHA1
1ea0126672f574a32e9fbfbd46655a5da74a3d04
-
SHA256
5120eb855819c036bd55ee3ec3156de695e89045b7ce9d6974c9a3057d25cc75
-
SHA512
6ed982cfa2602df18df5317f6df69c9dda81664f28942357ab27616bc01aaaba12132ad7db1ba22bf5872d6af75275df3de787943cd1afe5ffd64b3ba8e70be0
-
SSDEEP
12288:Etz7WjuHZEkg+RofhL1aa3dDrWM3dOt0ugFCZYHMbYIEnR6n7bnSVzVbucQk4r:Id5Ekgio95NrW+dOt0uAbzRwSVzhyk4r
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/12backup.exe
Files
-
88efc5002884bdc7a64eb2d745c1f7fe_JaffaCakes118.rar
-
12backup.exe.exe windows:4 windows x86 arch:x86
b7c36ee29dad533b9e096f928c2537da
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
ord17
kernel32
ReadFile
CloseHandle
GetFileSize
CreateFileA
GetModuleFileNameA
CreateDirectoryA
GetFileAttributesA
Sleep
GetStringTypeW
GetStringTypeA
LCMapStringW
lstrcatA
GetTempPathA
GetLocaleInfoA
MultiByteToWideChar
HeapSize
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
LoadLibraryA
RtlUnwind
InitializeCriticalSection
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
InterlockedDecrement
GetCurrentThreadId
SetLastError
SetFileAttributesA
WriteFile
LocalFileTimeToFileTime
SetFileTime
GetCommandLineA
lstrlenA
lstrcpyA
MulDiv
LCMapStringA
InterlockedIncrement
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetFileType
SetHandleCount
GetEnvironmentStringsW
GetLastError
HeapFree
HeapAlloc
GetVersionExA
GetProcessHeap
GetStartupInfoA
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapDestroy
HeapCreate
VirtualFree
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
VirtualAlloc
HeapReAlloc
GetProcAddress
GetModuleHandleA
ExitProcess
GetStdHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
user32
GetClassLongA
DestroyWindow
CreateDialogParamA
ShowWindow
MessageBoxA
UpdateWindow
wsprintfA
GetAsyncKeyState
DialogBoxParamA
IsWindow
IsDialogMessageA
TranslateMessage
DispatchMessageA
PeekMessageA
GetClassNameA
GetDlgItemTextA
SetDlgItemTextA
IsDlgButtonChecked
LoadImageA
CheckDlgButton
SetFocus
GetDlgItem
GetSysColor
EndDialog
LoadIconA
SetClassLongA
SendDlgItemMessageA
DestroyIcon
GetSysColorBrush
GetDC
ReleaseDC
SendMessageA
LoadCursorA
gdi32
SetBkColor
GetDeviceCaps
CreateFontA
DeleteObject
SetTextColor
advapi32
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
shell32
SHGetPathFromIDListA
SHChangeNotify
SHGetMalloc
SHBrowseForFolderA
ShellExecuteA
ole32
OleUninitialize
OleInitialize
Sections
.text Size: 43KB - Virtual size: 43KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
新云软件.url.url