Static task
static1
Behavioral task
behavioral1
Sample
wyko_electromechanical_services_ltd.scr
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
wyko_electromechanical_services_ltd.scr
Resource
win10v2004-20240802-en
General
-
Target
0a0e76d58e89e5b2a273be91cf798fe0_JaffaCakes118
-
Size
19KB
-
MD5
0a0e76d58e89e5b2a273be91cf798fe0
-
SHA1
87cde18547d71ba5d8e79f718420086ea532dc10
-
SHA256
7a6bf25e7c8926f85613dcb4d5f72cdc85dcb4e67a3dc178c72666d8ad16a729
-
SHA512
4ef4f676d6657f37077afed4aeb107f03f5a886d21fa31536d98ccd09df526659d7e6a1b9f71c35b92cb1fb0f094d2f113d995ea810a6eb560e0c2a8d827c95c
-
SSDEEP
384:cmnJ7BKZNdjP+XkMuYbvHXieNghPdsyiaKR0vzcMUcKPmhQoalu:cmJdijjYLXie6pd99AOhralu
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/wyko_electromechanical_services_ltd.scr
Files
-
0a0e76d58e89e5b2a273be91cf798fe0_JaffaCakes118.cab
-
wyko_electromechanical_services_ltd.scr.exe windows:4 windows x86 arch:x86
d2841f45bf71d1c069b9a0f11b63eb04
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetSystemInfo
CreateMutexA
WriteProcessMemory
GetCurrentProcess
GetTimeFormatA
CreateSemaphoreW
LoadLibraryA
SleepEx
CreateDirectoryA
GetTickCount
WriteFile
FoldStringW
GetNumberFormatA
CompareStringA
HeapCreate
ctl3d32
Ctl3dEnabled
Ctl3dCtlColor
Ctl3dGetVer
Ctl3dUnregister
Ctl3dRegister
user32
CreateWindowExW
IsZoomed
SetCursorPos
DialogBoxParamW
GetMessageA
PostMessageA
GetCaretPos
PeekMessageA
ShowWindow
GetWindowTextA
GetWindowLongA
IsWindow
ShowWindow
CharToOemA
themeui
DllCanUnloadNow
DllGetClassObject
DllGetClassObject
Sections
.text Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ