Static task
static1
Behavioral task
behavioral1
Sample
nesterJ.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
nesterJ.exe
Resource
win10v2004-20240802-en
General
-
Target
d016216eb3cdf9000c394fac4f66293f_JaffaCakes118
-
Size
129KB
-
MD5
d016216eb3cdf9000c394fac4f66293f
-
SHA1
72a98425b47191dc13e39dfacb76702f95564764
-
SHA256
cfa0000d322c110f5cf24af4006d23efd201b0ed8922305150558769555aee04
-
SHA512
cf8b0280e00e76e88e2c0f7ae679afc4b7f70057276998a7447b731ed60c043bf3140861b08035b8904004b72f273321022271368736ebdd7b3bf4a7246c03c1
-
SSDEEP
3072:vuvpgkW1MWE5tf8OJkXtI1+O9TT/iWnfOR5slfUn02j1Hl:cKkP5eOJkiEO9TGWfOR+wj1F
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/nesterJ.exe
Files
-
d016216eb3cdf9000c394fac4f66293f_JaffaCakes118.rar
-
nesterJ.exe.exe windows:4 windows x86 arch:x86
f1468f8107aa7a36d4a20be321aafc42
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindFirstFileA
GetFullPathNameA
CreateDirectoryA
GetVersionExA
SetEndOfFile
LCMapStringW
LCMapStringA
GetOEMCP
GetACP
GetCPInfo
GetStringTypeW
GetStringTypeA
MultiByteToWideChar
SetStdHandle
IsBadCodePtr
IsBadReadPtr
GetEnvironmentStringsW
GetEnvironmentStrings
WideCharToMultiByte
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
FlushFileBuffers
GetDriveTypeA
GetCurrentDirectoryA
HeapSize
GetFileType
GetStdHandle
SetHandleCount
SetFilePointer
WriteFile
SetUnhandledExceptionFilter
IsBadWritePtr
HeapReAlloc
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
FreeLibrary
GetEnvironmentVariableA
GetVersion
GetStartupInfoA
TerminateProcess
ExitProcess
GetLastError
RtlUnwind
RaiseException
HeapFree
HeapAlloc
GetModuleFileNameA
CloseHandle
ReadFile
GetFileSize
CreateFileA
Sleep
GetCommandLineA
QueryPerformanceCounter
QueryPerformanceFrequency
LoadLibraryA
DeleteFileA
GetProcAddress
GetFileAttributesA
SetPriorityClass
FindClose
GetModuleHandleA
GetCurrentProcess
GetTempPathA
user32
SetDlgItemTextA
ScreenToClient
ClientToScreen
DispatchMessageA
GetCursorPos
GetAsyncKeyState
EnableWindow
SendDlgItemMessageA
IsDlgButtonChecked
EndDialog
SetWindowTextA
SendMessageA
EnableMenuItem
KillTimer
SetCursor
GetWindowTextA
GetDlgItem
CheckDlgButton
GetDlgItemTextA
GetParent
CheckRadioButton
CharNextA
LoadIconA
LoadCursorA
RegisterClassExA
LoadAcceleratorsA
CreateWindowExA
ShowWindow
UpdateWindow
SetFocus
PeekMessageA
TranslateAcceleratorA
TranslateMessage
SetCursorPos
GetMessageA
PostQuitMessage
DefWindowProcA
BeginPaint
EndPaint
PostMessageA
ChildWindowFromPoint
GetDlgCtrlID
GetWindowRect
SetMenuItemInfoA
SetForegroundWindow
DialogBoxParamA
MessageBoxA
GetSystemMetrics
SetRect
GetWindowLongA
AdjustWindowRectEx
SetWindowLongA
SetMenu
SetWindowPos
GetMenu
SetTimer
GetMenuItemCount
DeleteMenu
AppendMenuA
DrawMenuBar
GetSubMenu
CheckMenuRadioItem
GetClientRect
GetDC
ReleaseDC
GetForegroundWindow
gdi32
DeleteDC
CreateCompatibleDC
CreateDIBSection
BitBlt
RealizePalette
GetStockObject
SetDIBColorTable
AnimatePalette
SetPaletteEntries
SelectPalette
DeleteObject
StretchBlt
SelectObject
CreatePalette
advapi32
RegCloseKey
RegCreateKeyA
RegSetValueExA
RegSetValueA
RegDeleteKeyA
RegCreateKeyExA
RegQueryValueExA
shlwapi
PathAddBackslashA
PathRemoveFileSpecA
PathUnquoteSpacesA
PathFindFileNameA
PathRemoveExtensionA
StrChrA
shell32
DragFinish
DragQueryFileA
DragAcceptFiles
SHBrowseForFolderA
DragQueryPoint
SHGetPathFromIDListA
SHGetMalloc
winmm
timeBeginPeriod
timeGetTime
timeEndPeriod
comctl32
ord17
comdlg32
GetSaveFileNameA
GetOpenFileNameA
ddraw
DirectDrawEnumerateA
DirectDrawCreate
dsound
ord1
dinput
DirectInputCreateA
Sections
.text Size: 280KB - Virtual size: 279KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 63KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ