Static task
static1
Behavioral task
behavioral1
Sample
CF正点2.2.3查QQ.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
CF正点2.2.3查QQ.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
wg.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
wg.exe
Resource
win10v2004-20240802-en
General
-
Target
11a602633496e3083ec0f9ead0a91029_JaffaCakes118
-
Size
1.0MB
-
MD5
11a602633496e3083ec0f9ead0a91029
-
SHA1
a416300790811f0b6aca326d45231a3982829619
-
SHA256
491bf9caecb5644bb800619a621871da669d6b74a169bff12e3cf094b2faa82a
-
SHA512
ed864ad752afb2e6a3f2681fb9ffa6af113f197a213a2674d501c9ea90b0a97453fdc1635f2c924e9d35bc467dcebdb681f69749457c6582af13e322c9390d98
-
SSDEEP
24576:3x3bSxISQEe+6a2jaEKHNYZ9Q+6fUCli7Ne2pXUSUmKvAm/csdV0bOTK0:hPb+v2aEyNYrnUBKe2WSHKvAm/csXDb
Malware Config
Signatures
-
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource unpack001/CF正点2.2.3查QQ.exe unpack001/wg.dat
Files
-
11a602633496e3083ec0f9ead0a91029_JaffaCakes118.rar
-
CF正点2.2.3查QQ.exe.exe windows:4 windows x86 arch:x86
8e7886bade0a4bf7cd99258036ce3aa5
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mfc42
ord6059
ord4673
ord4274
ord6375
ord4486
ord2554
ord2512
ord5731
ord3922
ord1089
ord5199
ord2396
ord3346
ord5300
ord5302
ord2725
ord4079
ord4698
ord5307
ord5289
ord5714
ord2982
ord3147
ord3229
ord4465
ord3136
ord3262
ord2985
ord3081
ord2976
ord3830
ord3831
ord3825
ord3079
ord4080
ord4622
ord4424
ord3738
ord561
ord825
ord815
ord2818
ord2621
ord1134
ord1199
ord1247
ord1576
ord5204
ord5808
ord540
ord5353
ord533
ord5194
ord798
ord800
ord6392
ord690
ord3259
ord389
ord1168
msvcrt
_onexit
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
_controlfp
??1type_info@@UAE@XZ
fopen
fgets
strstr
fclose
_mbsrchr
strrchr
strcat
_mbschr
sprintf
strcpy
memset
_mbscmp
atol
__CxxFrameHandler
strlen
memcpy
_setmbcp
__dllonexit
kernel32
RemoveDirectoryA
WaitForSingleObject
CreateProcessA
DeleteFileA
CreateDirectoryA
GetCurrentThreadId
GetTempPathA
GetPrivateProfileStringA
GetPrivateProfileIntA
GetModuleFileNameA
GetLastError
CreateEventA
GetModuleHandleA
GetStartupInfoA
CloseHandle
user32
PostMessageA
MessageBoxA
ole32
CoInitialize
wininet
InternetCrackUrlA
shlwapi
SHSetValueA
Sections
.text Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 716B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
config.dat
-
wg.dat.exe windows:5 windows x86 arch:x86
0982a43ea1eab70c5decb2730aaebce4
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
winmm
midiStreamOut
ws2_32
WSAAsyncSelect
kernel32
GetTimeZoneInformation
user32
PeekMessageA
gdi32
Escape
winspool.drv
ClosePrinter
advapi32
RegOpenKeyExA
shell32
Shell_NotifyIconA
ole32
StgCreateDocfileOnILockBytes
oleaut32
VariantChangeType
comctl32
ord17
oledlg
ord8
comdlg32
ChooseColorA
msvcrt
strncpy
iphlpapi
GetInterfaceInfo
psapi
GetMappedFileNameW
Sections
.text Size: 352KB - Virtual size: 836KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.sedata Size: 1.2MB - Virtual size: 1.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.sedata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ