Behavioral task
behavioral1
Sample
keygen.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
keygen.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
setup.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
setup.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
非常世纪资源网.url
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
非常世纪资源网.url
Resource
win10v2004-20240802-en
General
-
Target
cfe834cc70e3d672ee4ac9a81b166f38_JaffaCakes118
-
Size
6.2MB
-
MD5
cfe834cc70e3d672ee4ac9a81b166f38
-
SHA1
ef6824b914bff14b9d566e761d9551a7feb7c8de
-
SHA256
1f09bd68c2c8ed092420e6fca3ef0e21da197614f3eec4c0439364353358f886
-
SHA512
f85c84f29e074c22be46806e529bd525f6b5ac57dea4ab0b46d2962035262078093c773b93bd6534a77432a47acb34109516e50b7f068844db2d3ce514133975
-
SSDEEP
98304:8rji1LVFO+MIu+PfqBkYNlnubC2Ake+28Czr/pwHRzBeZm9F7vi32+eIC8+xDSzK:8ni1OwhMQbCwJ2r/mKmKX+CZ5QX
Malware Config
Signatures
-
resource yara_rule static1/unpack001/keygen.exe upx -
Unsigned PE 3 IoCs
Checks for missing Authenticode signature.
resource unpack001/keygen.exe unpack002/out.upx unpack001/setup.exe
Files
-
cfe834cc70e3d672ee4ac9a81b166f38_JaffaCakes118.rar
-
keygen.exe.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 140KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 63KB - Virtual size: 64KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 148KB - Virtual size: 146KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
setup.exe.exe windows:4 windows x86 arch:x86
d84d991d25f1d024e6888428c049c5f2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcAddress
FormatMessageA
DeleteFileA
MulDiv
IsDBCSLeadByte
GetExitCodeProcess
CreateProcessA
GetTempFileNameA
GetSystemDefaultLCID
WaitForSingleObject
CompareStringA
Sleep
SetFileTime
LocalFileTimeToFileTime
DosDateTimeToFileTime
FreeLibrary
RemoveDirectoryA
FindNextFileA
WritePrivateProfileSectionA
GetStartupInfoA
WriteFile
ReadFile
SetFileAttributesA
LocalFree
LocalAlloc
LockResource
LoadResource
FindResourceA
SizeofResource
GetModuleHandleA
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
MultiByteToWideChar
lstrcmpiA
GetDiskFreeSpaceA
HeapAlloc
GetProcessHeap
HeapFree
lstrcpynA
ExitProcess
CreateFileA
CreateFileMappingA
MapViewOfFile
UnmapViewOfFile
CreateDirectoryA
SetFilePointer
GetFileSize
FindClose
GetLastError
FindFirstFileA
lstrlenA
GetFileAttributesA
GetPrivateProfileStringA
GetSystemDirectoryA
GetWindowsDirectoryA
lstrcatA
GetModuleFileNameA
GetTempPathA
lstrcpyA
GetPrivateProfileSectionA
LoadLibraryA
MoveFileExA
WritePrivateProfileStringA
GetShortPathNameA
FlushFileBuffers
IsBadCodePtr
CloseHandle
SetStdHandle
SetUnhandledExceptionFilter
LCMapStringW
LCMapStringA
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
WideCharToMultiByte
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetStringTypeW
GetStringTypeA
GetOEMCP
GetACP
GetCPInfo
IsBadWritePtr
HeapReAlloc
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
GetVersionExA
GetEnvironmentVariableA
GetVersion
GetCommandLineA
RtlUnwind
IsBadReadPtr
user32
SetFocus
PostMessageA
GetDlgItem
SendDlgItemMessageA
GetParent
GetDC
LoadImageA
MessageBoxA
wsprintfA
CheckRadioButton
EnableWindow
IsDlgButtonChecked
GetDlgItemTextA
CheckDlgButton
SetDlgItemTextA
ReleaseDC
GetWindowLongA
SetWindowTextA
CharNextA
GetDesktopWindow
GetWindowTextA
GetWindow
DestroyWindow
CreateDialogParamA
GetSysColor
GetSysColorBrush
FillRect
BeginPaint
DrawTextA
EndPaint
GetClientRect
ScreenToClient
MoveWindow
SetParent
MapDialogRect
GetNextDlgTabItem
GetWindowRect
CreateDialogIndirectParamA
IsWindow
InvalidateRect
IsWindowEnabled
ShowWindow
UpdateWindow
IsDialogMessageA
SetWindowPos
GetActiveWindow
SetActiveWindow
SetWindowLongA
LoadStringA
LoadIconA
DispatchMessageA
SendMessageA
TranslateMessage
PeekMessageA
gdi32
CreateFontIndirectA
RealizePalette
SelectPalette
CreatePalette
GetObjectA
GetStockObject
CreateDIBitmap
GetTextExtentPointA
SelectObject
EnumFontFamiliesExA
DeleteDC
BitBlt
TextOutA
SetBkMode
SetBkColor
CreateCompatibleDC
CreateSolidBrush
SetTextColor
DeleteObject
GetDeviceCaps
advapi32
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
shell32
ShellExecuteA
SHBrowseForFolderA
SHGetPathFromIDListA
SHGetMalloc
lz32
LZOpenFileA
LZCopy
LZClose
comctl32
ord17
Sections
.text Size: 76KB - Virtual size: 73KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 180KB - Virtual size: 178KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
下载说明.htm.html .js polyglot
-
安装说明.txt
-
非常世纪资源网.url.url