Static task
static1
Behavioral task
behavioral1
Sample
155绿色软件站.url
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
155绿色软件站.url
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
Patch.exe
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
Patch.exe
Resource
win10v2004-20240802-en
General
-
Target
b9ce714a498b0831579996223223c0d8_JaffaCakes118
-
Size
20KB
-
MD5
b9ce714a498b0831579996223223c0d8
-
SHA1
f65d4b59c9abab99151a77467375a4c6b9362ccf
-
SHA256
8fc5f6e3dcefade0088b86556f0e53d0c1cf3f4f22adf87516b09c6a10772512
-
SHA512
7879ec2440938464e92576626f17738be447de8744a2c516e8874f97767034cd5b35160ea1fffa424e9e7705cd62bc0cdc20c5e8ced2b8f1c43750fdd2128502
-
SSDEEP
384:/q8OrI+BDw+xfFArkKLZqaWly/2KWGgVwO/d/dXCznn:/MrrEmArkocaUyOFfVx/VdSrn
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/Patch.exe
Files
-
b9ce714a498b0831579996223223c0d8_JaffaCakes118.rar
-
155绿色软件站.url.url
-
Patch.exe.exe windows:4 windows x86 arch:x86
5e26f09a8b4940be7347d1e10556b037
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
TrackPopupMenu
ShowWindow
SetWindowTextA
SetWindowRgn
UpdateWindow
SetWindowLongA
SetFocus
SetDlgItemTextA
SetClassLongA
SetCapture
SetWindowPos
SendMessageA
ReleaseCapture
RegisterClassExA
RedrawWindow
PtInRect
OffsetRect
MessageBoxA
LoadStringA
LoadIconA
LoadCursorA
LoadBitmapA
IsDlgButtonChecked
InvalidateRect
IntersectRect
GetWindowRect
GetWindowLongA
GetSystemMetrics
GetParent
GetKeyState
GetDlgItemTextA
CloseClipboard
EmptyClipboard
OpenClipboard
SetClipboardData
GetClientRect
MoveWindow
GetDlgItem
GetDlgCtrlID
GetDC
GetCursorPos
GetCapture
GetActiveWindow
EndDialog
EnableWindow
DrawTextA
DialogBoxParamA
DefWindowProcA
CreateWindowExA
CreatePopupMenu
CheckDlgButton
CallWindowProcA
AppendMenuA
kernel32
WriteFile
CompareStringA
SetCurrentDirectoryA
CreateDirectoryA
GlobalAlloc
GlobalLock
GlobalUnlock
FlushFileBuffers
lstrlenW
lstrlenA
lstrcpyA
lstrcmpiA
lstrcmpA
lstrcatA
WideCharToMultiByte
WaitForSingleObject
VirtualFree
VirtualAlloc
UnmapViewOfFile
CloseHandle
CopyFileA
CreateFileA
CreateFileMappingA
CreateProcessA
CreateThread
DeleteFileA
ExitProcess
ExpandEnvironmentStringsA
FindResourceA
FreeLibrary
GetCommandLineA
GetCurrentDirectoryA
GetFileAttributesA
GetFileSize
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GetTempPathA
LoadLibraryA
LoadResource
MapViewOfFile
MoveFileA
MultiByteToWideChar
RtlMoveMemory
RtlZeroMemory
SetEndOfFile
SetEnvironmentVariableA
SetFileAttributesA
SetFilePointer
SizeofResource
Sleep
shell32
ShellExecuteA
gdi32
CreateDIBSection
CreateFontIndirectA
CreateSolidBrush
ExtCreateRegion
GetStockObject
BitBlt
CreateCompatibleBitmap
CreateCompatibleDC
TextOutA
SetTextColor
SetBkMode
SetBkColor
SelectObject
RoundRect
RemoveFontResourceA
GetTextExtentPointA
AddFontResourceA
comctl32
InitCommonControls
advapi32
RegCloseKey
RegCreateKeyExA
RegOpenKeyA
RegQueryValueExA
comdlg32
GetSaveFileNameA
GetOpenFileNameA
Sections
.text Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 65KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 22KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ