Behavioral task
behavioral1
Sample
19e.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
19e.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
19e.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
19e.exe
Resource
win10v2004-20240802-en
General
-
Target
e12f6332f85d022f7b302a863b07f253_JaffaCakes118
-
Size
50KB
-
MD5
e12f6332f85d022f7b302a863b07f253
-
SHA1
e33b7b52bd57fc9dd05da3c80bdb355c9a1c01fd
-
SHA256
96449f693813dd48277c08b2bfd10edad208cea3e5b6f6d972d68be64721d59d
-
SHA512
d38dc7e6a9e6ff7f6454cde2ee028a0ef1fc3d0bd6ac99ad84f5749d854f2ccf32f3ff9dbdacd95ebaef0c78d70f20b195cb2322989b5259df8d3ba0150abf48
-
SSDEEP
1536:SDwfADswjKhCc3Z11FMH4XZ6LandSnRFCSFF4hj:tYpm7JPFMH7LwdURFjFKN
Malware Config
Signatures
-
resource yara_rule static1/unpack001/19e.dll upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource unpack001/19e.dll unpack001/19e.exe
Files
-
e12f6332f85d022f7b302a863b07f253_JaffaCakes118.zip
-
19e.cfg
-
19e.dll.dll windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Sections
UPX0 Size: - Virtual size: 80KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 19KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
19e.exe.exe windows:4 windows x86 arch:x86
e9367ab1b2a21ff8e392e7ff8f87352b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
SetThreadContext
SuspendThread
Sleep
ResumeThread
OpenProcess
WriteProcessMemory
VirtualProtectEx
GetThreadContext
GetExitCodeThread
WaitForSingleObject
CreateRemoteThread
ExitProcess
ReadProcessMemory
GlobalAlloc
GetWindowsDirectoryA
GetTempPathA
CopyFileA
GetSystemDirectoryA
SetFileAttributesA
FindNextFileA
MoveFileA
TerminateProcess
CreateProcessA
SetCurrentDirectoryA
GetModuleFileNameA
LoadLibraryA
GlobalFree
GetModuleHandleA
DeleteFileA
FindFirstFileA
GetVersion
GetFileType
HeapDestroy
SetFilePointer
GetProcAddress
SetEndOfFile
RtlUnwind
GetStartupInfoA
GetCommandLineA
WideCharToMultiByte
MultiByteToWideChar
LCMapStringA
LCMapStringW
HeapFree
GetLastError
GetCurrentProcess
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetStringTypeW
HeapAlloc
HeapCreate
VirtualFree
WriteFile
SetUnhandledExceptionFilter
IsBadReadPtr
IsBadWritePtr
IsBadCodePtr
GetStringTypeA
FlushFileBuffers
ReadFile
VirtualAlloc
HeapReAlloc
SetStdHandle
GetACP
CreateFileA
GetCPInfo
GetOEMCP
user32
MessageBoxA
comdlg32
GetOpenFileNameA
GetSaveFileNameA
advapi32
RegCreateKeyA
RegQueryValueExA
RegCloseKey
RegOpenKeyExA
RegSetValueExA
Sections
.text Size: 51KB - Virtual size: 51KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 928B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
19e.ini