Static task
static1
Behavioral task
behavioral1
Sample
huamian.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
huamian.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
nvsvc32.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
nvsvc32.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
pk.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
pk.exe
Resource
win10v2004-20240802-en
General
-
Target
130946ab1b278f23be6bc5c64b6f98de_JaffaCakes118
-
Size
1.5MB
-
MD5
130946ab1b278f23be6bc5c64b6f98de
-
SHA1
6ac5cf70f9dbc91a0f955834b09783ce5b456962
-
SHA256
a703251dff6269af9e4cd702873366801e0ace6347ad8ca151b3ce529a64e04a
-
SHA512
680e3d1a152c2ee709cf6234bd033a007321b69c002d8c7386ca9d580e481efde646d92dd69487df096f2908c7cf76a5de32a62048eacc9e03cdf2170b525ec8
-
SSDEEP
49152:iqPZV4o9UEktrp1K4iB/a8asSfPpBSpnWe7u:DNCECpgVURI8e7u
Malware Config
Signatures
-
Unsigned PE 3 IoCs
Checks for missing Authenticode signature.
resource unpack001/huamian.exe unpack001/nvsvc32.exe unpack001/pk.exe
Files
-
130946ab1b278f23be6bc5c64b6f98de_JaffaCakes118.cab
-
huamian.exe.exe windows:1 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
CODE Size: 375KB - Virtual size: 374KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
DATA Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BSS Size: - Virtual size: 2KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: - Virtual size: 16B
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 23KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1.1MB - Virtual size: 1.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
nvsvc32.exe.exe windows:4 windows x86 arch:x86
e5e10da264a4d065e2e6b2453a372137
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateThread
SetEnvironmentVariableA
CompareStringW
CompareStringA
GetLocaleInfoW
GetTimeZoneInformation
SetConsoleCtrlHandler
FlushFileBuffers
SetStdHandle
GetStringTypeW
GetStringTypeA
GetOEMCP
GetACP
SetFilePointer
GetUserDefaultLCID
EnumSystemLocalesA
GetLocaleInfoA
IsValidCodePage
IsValidLocale
GetCPInfo
WriteFile
GetCurrentThread
TlsGetValue
TlsFree
TlsAlloc
TlsSetValue
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
TerminateProcess
LCMapStringW
LCMapStringA
IsBadWritePtr
HeapReAlloc
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
GetEnvironmentVariableA
GetModuleFileNameA
FatalAppExitA
ExitProcess
CreateFileW
PulseEvent
lstrcmpiW
TerminateThread
InterlockedIncrement
InterlockedDecrement
WideCharToMultiByte
GetSystemDirectoryW
GetCurrentThreadId
GetVersionExW
InitializeCriticalSection
CreateEventW
WaitForMultipleObjects
ResetEvent
DeleteCriticalSection
GetCurrentProcess
GetUserDefaultLangID
GetThreadLocale
OpenEventW
SetEvent
GetSystemPowerStatus
LocalAlloc
LocalFree
FormatMessageW
lstrlenW
SetLastError
FreeLibrary
lstrcpynW
EnterCriticalSection
LeaveCriticalSection
GetTickCount
lstrcmpW
WaitForSingleObject
CloseHandle
lstrcatW
Sleep
GetModuleHandleW
lstrcpyW
GetLastError
LoadLibraryW
GetProcAddress
CreateProcessW
GetVersion
GetCommandLineA
HeapAlloc
HeapFree
RtlUnwind
GetVersionExA
GetModuleHandleA
LoadLibraryA
MultiByteToWideChar
user32
SubtractRect
ReleaseDC
GetDC
SystemParametersInfoW
GetWindowRect
FindWindowW
IntersectRect
GetSystemMetrics
UnregisterDeviceNotification
RegisterDeviceNotificationW
PostQuitMessage
DefWindowProcW
RegisterClassExW
CreateWindowExW
GetMessageW
DispatchMessageW
CloseWindow
PostThreadMessageW
GetWindowThreadProcessId
GetThreadDesktop
SetThreadDesktop
OpenWindowStationW
SetProcessWindowStation
ExitWindowsEx
GetLastInputInfo
OpenInputDesktop
OpenDesktopW
GetUserObjectInformationW
CloseDesktop
MonitorFromWindow
EqualRect
GetDesktopWindow
wsprintfW
ChangeDisplaySettingsExW
GetTopWindow
GetWindow
GetClassNameW
PostMessageW
EnumDisplaySettingsW
IsRectEmpty
FindWindowExW
GetCursorPos
GetForegroundWindow
SetCursorPos
SendMessageW
SetWindowPos
InvalidateRect
gdi32
CreateDCA
CreateDCW
ExtEscape
DeleteDC
advapi32
RegOverridePredefKey
RegEnumValueW
ConvertStringSidToSidW
FreeSid
RegisterServiceCtrlHandlerW
SetServiceStatus
AllocateAndInitializeSid
SetEntriesInAclW
OpenProcessToken
LookupPrivilegeValueW
AdjustTokenPrivileges
StartServiceCtrlDispatcherW
RegSetKeySecurity
RegQueryInfoKeyW
RegEnumKeyExW
IsValidSid
RegGetKeySecurity
IsValidSecurityDescriptor
GetSecurityDescriptorDacl
GetAclInformation
GetAce
GetLengthSid
InitializeAcl
AddAccessAllowedAceEx
AddAce
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
RegDeleteKeyW
RegCreateKeyExW
RegSetValueExW
RegDeleteValueW
OpenServiceW
ControlService
QueryServiceStatus
DeleteService
OpenSCManagerW
CreateServiceW
CloseServiceHandle
RegCloseKey
GetTokenInformation
RegOpenKeyExW
RegQueryValueExW
CreateProcessAsUserW
userenv
LoadUserProfileW
UnloadUserProfile
powrprof
CallNtPowerInformation
Sections
.text Size: 108KB - Virtual size: 107KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1008B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
pk.exe.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.TTP Size: 687KB - Virtual size: 784KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.TTP Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.TTP Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.TTP Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.TTP Size: 49KB - Virtual size: 52KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE