Static task
static1
Behavioral task
behavioral1
Sample
boys tool/boy's tool.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
boys tool/boy's tool.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
boys tool/新云软件.url
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
boys tool/新云软件.url
Resource
win10v2004-20240802-en
General
-
Target
d23dff6bb155c42a69fdacbad45d72b3_JaffaCakes118
-
Size
2.6MB
-
MD5
d23dff6bb155c42a69fdacbad45d72b3
-
SHA1
7dfe6e70d6eb5b6b25879ebfb25858812fbcaa74
-
SHA256
36133419451e9d68b3ae214b51c898a95974cdeda74d74b3d7e11dbb7b8c5f5b
-
SHA512
083e22d8d29401ef3b8cc8b27337186fb311e2f627785b8441c21c3eb64dba92b3062843bc0b37b6b9fa3a1a3c9759818db00a6e87563a33868ec263d0dd9f40
-
SSDEEP
49152:JVC7DGYoWTapHruM54OZJ7rxh6DMVogtlbB8Bn5:JVwDPCrCqtrEitA3
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/boys tool/boy's tool.exe
Files
-
d23dff6bb155c42a69fdacbad45d72b3_JaffaCakes118.rar
-
boys tool/QQWry.Dat
-
boys tool/boy's tool.exe.exe windows:4 windows x86 arch:x86
f4de7f24ba7406724619c1518a1136f3
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mfc42
ord3402
ord4424
ord3574
ord609
ord567
ord2302
ord858
ord6334
ord2642
ord4224
ord6199
ord3092
ord3499
ord2515
ord355
ord4673
ord4274
ord6375
ord4486
ord2554
ord2512
ord5731
ord3922
ord1089
ord5199
ord2396
ord3346
ord5300
ord5302
ord2725
ord4079
ord4698
ord5307
ord5289
ord5714
ord4622
ord3738
ord561
ord815
ord790
ord693
ord804
ord2621
ord1134
ord1199
ord1247
ord2587
ord2124
ord3394
ord3729
ord1146
ord1168
ord6111
ord3996
ord4299
ord2086
ord6785
ord2379
ord755
ord5290
ord6215
ord941
ord823
ord537
ord2582
ord4402
ord3370
ord3640
ord4278
ord2764
ord6283
ord6877
ord924
ord6907
ord3998
ord2818
ord4220
ord2584
ord3654
ord2438
ord6270
ord2863
ord1644
ord3301
ord926
ord2915
ord922
ord3663
ord5572
ord3716
ord6646
ord3874
ord2864
ord535
ord4694
ord2446
ord5261
ord1727
ord5065
ord3749
ord6376
ord2055
ord2648
ord4441
ord4837
ord3798
ord5280
ord4353
ord6374
ord5163
ord2385
ord5241
ord4407
ord1775
ord4078
ord6052
ord2514
ord4710
ord4998
ord4396
ord1776
ord6055
ord2575
ord4234
ord2370
ord825
ord324
ord540
ord860
ord641
ord800
ord3597
ord4425
ord4627
ord4080
ord3079
ord3825
ord3831
ord3830
ord2976
ord3081
ord2985
ord3262
ord3136
ord4465
ord3259
ord3147
ord2982
ord470
ord5277
ord4853
ord4376
ord4406
ord5265
ord1576
msvcrt
_setmbcp
__CxxFrameHandler
_mbscmp
rename
_splitpath
malloc
free
atol
atoi
__dllonexit
_onexit
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
_controlfp
kernel32
GetModuleHandleA
LocalAlloc
GetLastError
GetCurrentProcessId
GetCurrentProcess
Process32First
GetPriorityClass
GetProcessTimes
FileTimeToSystemTime
Process32Next
OpenProcess
TerminateProcess
WaitForSingleObject
LoadLibraryA
GetProcAddress
CreateToolhelp32Snapshot
Module32First
GetWindowsDirectoryA
Module32Next
GlobalAlloc
GlobalLock
GlobalUnlock
lstrcpyA
CreateFileA
SetFilePointer
ReadFile
CloseHandle
MoveFileExA
DeleteFileA
GetStartupInfoA
user32
GetWindowLongA
SetWindowLongA
SetWindowPos
ShowWindow
GetDesktopWindow
GetWindow
GetClassNameA
GetWindowThreadProcessId
CheckMenuItem
OpenClipboard
EmptyClipboard
SetClipboardData
CloseClipboard
GetMessagePos
LoadMenuA
GetSubMenu
LockWindowUpdate
IsIconic
GetSystemMetrics
GetClientRect
LoadIconA
AnimateWindow
EnableMenuItem
EnableWindow
DrawIcon
SendMessageA
advapi32
RegCloseKey
RegCreateKeyExA
RegQueryValueExA
RegEnumValueA
RegOpenKeyExA
RegDeleteValueA
RegEnumKeyExA
RegQueryInfoKeyA
RegDeleteKeyA
LookupAccountSidA
GetTokenInformation
OpenProcessToken
AdjustTokenPrivileges
LookupPrivilegeValueA
CloseServiceHandle
QueryServiceConfigA
OpenServiceA
EnumServicesStatusA
OpenSCManagerA
QueryServiceConfig2A
QueryServiceStatus
StartServiceA
ControlService
ChangeServiceConfigA
ChangeServiceConfig2A
DeleteService
RegSetValueExA
shell32
ShellExecuteA
ShellExecuteExA
psapi
GetProcessMemoryInfo
wsock32
inet_addr
ntohl
htonl
htons
ioctlsocket
Sections
.text Size: 48KB - Virtual size: 46KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
boys tool/新云软件.url.url