Overview
overview
8Static
static
7giod61om3/aspimgr.exe
windows7-x64
3giod61om3/aspimgr.exe
windows10-2004-x64
3giod61om3/braviax.exe
windows7-x64
1giod61om3/braviax.exe
windows10-2004-x64
3giod61om3/cru629.dll
windows7-x64
3giod61om3/cru629.dll
windows10-2004-x64
8giod61om3/index[.js
windows7-x64
3giod61om3/index[.js
windows10-2004-x64
3giod61om3/...1].exe
windows7-x64
7giod61om3/...1].exe
windows10-2004-x64
7giod61om3/ntos.exe
windows7-x64
3giod61om3/ntos.exe
windows10-2004-x64
3giod61om3/...tr.exe
windows7-x64
3giod61om3/...tr.exe
windows10-2004-x64
3giod61om3/~ie3.exe
windows7-x64
1giod61om3/~ie3.exe
windows10-2004-x64
3Behavioral task
behavioral1
Sample
giod61om3/aspimgr.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
giod61om3/aspimgr.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
giod61om3/braviax.exe
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
giod61om3/braviax.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
giod61om3/cru629.dll
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
giod61om3/cru629.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
giod61om3/index[.js
Resource
win7-20240729-en
Behavioral task
behavioral8
Sample
giod61om3/index[.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
giod61om3/index[1].exe
Resource
win7-20240704-en
Behavioral task
behavioral10
Sample
giod61om3/index[1].exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
giod61om3/ntos.exe
Resource
win7-20240705-en
Behavioral task
behavioral12
Sample
giod61om3/ntos.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
giod61om3/winivstr.exe
Resource
win7-20240729-en
Behavioral task
behavioral14
Sample
giod61om3/winivstr.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
giod61om3/~ie3.exe
Resource
win7-20240708-en
Behavioral task
behavioral16
Sample
giod61om3/~ie3.exe
Resource
win10v2004-20240802-en
General
-
Target
b404374fb3cec8259c542ce3b242a108_JaffaCakes118
-
Size
710KB
-
MD5
b404374fb3cec8259c542ce3b242a108
-
SHA1
46ea6492d401a9c32d164d7a03b02d76f6c6391e
-
SHA256
1d178533296375d2ea9f8b7d5526866883e60d96173e0229dc38ce8b2ca9e726
-
SHA512
403c207ec2c6f30d17d1bcfe61ebc70e9e81c4a00ccb3d072ed526a0b55138ab34d6ca379b6097de2cc05909130003399173801b6efa78b2dbea6093033ebeb9
-
SSDEEP
12288:aSVCbaquW5SRApbl4fJwkZPfzwxHiu4Ruj69WnhK/IYqvBanoIFNe:aSVrqjCApbOpz+HVGfzWBa2
Malware Config
Signatures
-
resource yara_rule static1/unpack001/giod61om3/index[1] upx -
Unsigned PE 8 IoCs
Checks for missing Authenticode signature.
resource unpack001/giod61om3/aspimgr.exe unpack001/giod61om3/braviax.exe unpack001/giod61om3/cru629.dat unpack001/giod61om3/index[1] unpack002/out.upx unpack001/giod61om3/ntos.exe unpack001/giod61om3/winivstr.exe unpack001/giod61om3/~ie3.exe
Files
-
b404374fb3cec8259c542ce3b242a108_JaffaCakes118.zip
Password: infected
-
giod61om3/aspimgr.exe.exe windows:4 windows x86 arch:x86
ded3edb311f58c4c6a57f343ec1004ec
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrcpynA
lstrlenA
lstrcpyA
lstrcatA
Sleep
GetLastError
HeapFree
GetProcessHeap
HeapAlloc
GetProcAddress
LoadLibraryA
GetModuleHandleA
LeaveCriticalSection
EnterCriticalSection
lstrcmpA
lstrcmpiA
FreeLibrary
GlobalFree
GlobalAlloc
ws2_32
listen
accept
recvfrom
bind
ntohs
sendto
recv
send
htons
connect
WSAGetLastError
select
__WSAFDIsSet
socket
ioctlsocket
setsockopt
shutdown
closesocket
WSACleanup
WSAStartup
inet_addr
gethostname
gethostbyname
inet_ntoa
msvcrt
_controlfp
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
__p___initenv
exit
_XcptFilter
_exit
atol
_strlwr
_itoa
strcpy
_beginthread
_endthread
sscanf
strstr
memset
atoi
memcpy
free
malloc
fclose
fwrite
fopen
strncmp
memmove
strlen
isspace
strchr
Sections
.text Size: 52KB - Virtual size: 49KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 315KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
giod61om3/braviax.exe.exe windows:4 windows x86 arch:x86
ab2acf9a1676eb22e3230be8d6c3bb80
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateToolhelp32Snapshot
DebugActiveProcess
ExitProcess
GetVolumeInformationA
Process32Next
TryEnterCriticalSection
lstrcpyn
advapi32
AdjustTokenGroups
ConvertSecurityDescriptorToAccessNamedA
CreateProcessAsUserA
CryptEnumProvidersW
CryptSetProvParam
CryptSignHashA
FreeSid
GetTrusteeTypeA
LockServiceDatabase
LookupAccountSidW
ObjectDeleteAuditAlarmW
QueryServiceLockStatusW
RegDeleteKeyA
SetEntriesInAccessListW
shell32
CommandLineToArgvW
Control_FillCache_RunDLL
DoEnvironmentSubstW
ExtractAssociatedIconExW
SHFileOperationW
SHFreeNameMappings
SHGetDesktopFolder
SheChangeDirA
SheSetCurDrive
gdi32
CreateDIBitmap
Ellipse
EnumFontFamiliesW
FixBrushOrgEx
GetCharacterPlacementA
GetEnhMetaFileHeader
RestoreDC
StartDocA
Sections
.text Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 6KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
giod61om3/cru629.dat.dll windows:1 windows x86 arch:x86
87bed5a7cba00c7e1f4015f1bdae2183
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
LoadLibraryA
GetProcAddress
Sections
.flat Size: 5KB - Virtual size: 72KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
giod61om3/index[.js
-
giod61om3/index[1].exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 84KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 48KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 88KB - Virtual size: 84KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
giod61om3/index[1].htm.html .js polyglot
-
giod61om3/ntos.exe.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 48KB - Virtual size: 138KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
giod61om3/winivstr.exe.exe windows:6 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Sections
LoadLi Size: 4KB - Virtual size: 1830.1MB
Size: 1.4MB - Virtual size: 4B
���� Size: - Virtual size:
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
-
giod61om3/~ie3.exe.exe windows:4 windows x86 arch:x86
4cb89564147137d5b233e46cce0f1666
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
AddAtomA
DebugBreak
ExitProcess
GetSystemDirectoryA
GetTapeStatus
GetTempFileNameW
GlobalReAlloc
SearchPathA
WriteProfileStringW
advapi32
ClearEventLogW
ConvertSecurityDescriptorToAccessNamedW
CreatePrivateObjectSecurity
CryptVerifySignatureW
DeleteAce
GetMultipleTrusteeA
IsValidAcl
LogonUserA
ObjectCloseAuditAlarmW
OpenEventLogA
OpenProcessToken
RegCreateKeyExA
RegEnumKeyExW
RegEnumKeyW
user32
CharToOemBuffA
EnumDisplayDevicesA
FindWindowA
GetClassInfoA
GetListBoxInfo
IsIconic
LoadCursorFromFileW
RedrawWindow
SendIMEMessageExA
SetCaretBlinkTime
SetScrollRange
SetWindowTextA
ShowCursor
shell32
DllGetVersion
DragQueryFileAorW
ExtractAssociatedIconExW
ExtractIconA
ExtractIconExA
ExtractIconResInfoW
PrintersGetCommand_RunDLL
RegenerateUserEnvironment
SHAddToRecentDocs
SHEmptyRecycleBinW
SHFileOperationW
SHGetMalloc
SheChangeDirW
SheFullPathA
ShellExecuteEx
Sections
.text Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 36KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE