Static task
static1
Behavioral task
behavioral1
Sample
EquationDrug_4556CE5EB007AF1DE5BD3B457F0B216D.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
EquationDrug_4556CE5EB007AF1DE5BD3B457F0B216D.exe
Resource
win10v2004-20240802-en
General
-
Target
bfe8ccc7c521a7f307e5339fc9d26a23_JaffaCakes118
-
Size
330KB
-
MD5
bfe8ccc7c521a7f307e5339fc9d26a23
-
SHA1
2e17c625a4aff6d708fe39b830c379b468fc6490
-
SHA256
4edbe982110160cdac002b5131b5168b5a6bc00e03c72993ce99be125538111c
-
SHA512
ab390e2091d395841b4bf31041766fa24d7ec4c5fce707aed9f8d8eb152f99c215eba0c39fa927e98459ac336516d3ed6bdf5c292988fb3054d8b2fe1b9c077d
-
SSDEEP
6144:FIfnHZS3c4Cz61yfhSzc9uKc2DRsacadGYP46hZl67XsOVnUjh9smqJ5jiC+Lcx:FIfnHEcc85SzYd9sadduUZA7Xs8UUHbZ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/EquationDrug_4556CE5EB007AF1DE5BD3B457F0B216D
Files
-
bfe8ccc7c521a7f307e5339fc9d26a23_JaffaCakes118.zip
Password: infected
-
EquationDrug_4556CE5EB007AF1DE5BD3B457F0B216D.exe windows:4 windows x86 arch:x86
a13f7af5e7f1875615725d3be04d90ca
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LocalAlloc
GetCurrentProcess
GetCurrentThread
GetModuleFileNameA
WriteFile
ReadFile
GetFileSize
CreateFileA
GetWindowsDirectoryA
MoveFileExA
LockResource
LoadResource
SizeofResource
FindResourceA
SetFileAttributesA
CreateMutexW
FindClose
FindFirstFileA
GetVersion
IsBadReadPtr
GetModuleHandleA
LoadLibraryExA
WaitForSingleObject
SetLastError
OpenMutexW
VirtualFree
ReleaseMutex
VirtualAlloc
lstrcpyA
CreateFileW
GetEnvironmentVariableW
LoadLibraryW
MapViewOfFile
CreateFileMappingA
SetFilePointer
GetCurrentProcessId
CloseHandle
GetSystemTime
GetStartupInfoA
CreateProcessA
LocalFree
Sleep
GetSystemDirectoryA
GetVersionExA
LoadLibraryA
GetProcAddress
CreateDirectoryA
GetLastError
FreeLibrary
DeleteFileA
ExitProcess
SetFileTime
user32
UnregisterClassW
UnregisterClassA
CreateWindowExW
DestroyWindow
SetPropA
advapi32
RegQueryValueExA
RegEnumKeyExA
RegOpenKeyExA
RegCloseKey
AccessCheck
OpenProcessToken
GetTokenInformation
GetSidSubAuthorityCount
GetSidSubAuthority
InitializeSecurityDescriptor
GetUserNameW
LookupAccountSidW
AllocateAndInitializeSid
FreeSid
SetSecurityDescriptorGroup
SetSecurityDescriptorOwner
AddAccessAllowedAce
InitializeAcl
DuplicateTokenEx
OpenThreadToken
SetSecurityDescriptorDacl
msvcrt
__setusermatherr
_adjust_fdiv
__p__commode
_wcsicmp
__p__fmode
__set_app_type
_stricmp
_controlfp
strlen
wcslen
??3@YAXPAX@Z
memset
??2@YAPAXI@Z
_snprintf
memcpy
strstr
wcscmp
strncpy
strchr
atoi
malloc
free
_local_unwind2
strcmp
wcsncat
wcscpy
strncmp
realloc
_strnicmp
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
Sections
.text Size: 32KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 492B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 324KB - Virtual size: 322KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ