Static task
static1
Behavioral task
behavioral1
Sample
DHL_Versandschein_3325.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
DHL_Versandschein_3325.exe
Resource
win10v2004-20241007-en
General
-
Target
28780b8269903bdb014d6c3a58b14bd9_JaffaCakes118
-
Size
386KB
-
MD5
28780b8269903bdb014d6c3a58b14bd9
-
SHA1
aa3848110cef8c2748920f2650f03a1510dee931
-
SHA256
9689baad163110e93eede93d7b299c9a7950753f480c128757c5c1a79476dd27
-
SHA512
b39340a8360a5c24231e0914b623b089a6b024db230efdf6d0c716f7a0fc4e6a774e28b1f86cb2610297d6b269dcf6c4652298282690f9e29b7d27b38fd1c2bf
-
SSDEEP
12288:yv9c48VZ+BkMlnL27Sy4JsgNvsix4hLY+uCYYdKks:yv9p8VZ+DniN8sgNvsLFuNXZ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/DHL_Versandschein_3325.exe
Files
-
28780b8269903bdb014d6c3a58b14bd9_JaffaCakes118.zip
-
DHL_Versandschein_3325.exe.exe windows:4 windows x86 arch:x86
6f25e0764411f31b05f6366a8e2ba446
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
IsZoomed
CheckDlgButton
RegisterHotKey
DdeInitializeW
FindWindowExA
GetClipboardData
DispatchMessageA
LoadAcceleratorsW
LoadStringW
ClipCursor
DeferWindowPos
InsertMenuA
TranslateMessage
SetScrollPos
CopyAcceleratorTableA
SetWindowPlacement
GetWindowTextW
GetDlgItemTextA
UnregisterClassW
CharToOemBuffW
InvalidateRect
GetClipboardViewer
LoadCursorA
GetUserObjectInformationW
SetTimer
GetMenu
ChangeDisplaySettingsExA
DlgDirListA
DestroyMenu
PostMessageW
GetDesktopWindow
GetCapture
InflateRect
CloseWindow
PostQuitMessage
IsWindowVisible
IsDialogMessageA
PostThreadMessageA
IntersectRect
FillRect
CharNextA
kernel32
GetLogicalDrives
CreateFileW
CompareStringW
GetPrivateProfileIntW
GetDriveTypeA
GetBinaryTypeW
GetUserDefaultLCID
GetLongPathNameA
FlushInstructionCache
HeapDestroy
GetModuleHandleA
GetTempFileNameW
AddAtomW
GetStartupInfoA
advapi32
RegisterServiceCtrlHandlerW
ChangeServiceConfigW
RegNotifyChangeKeyValue
LsaAddAccountRights
OpenSCManagerW
ReadEventLogW
QueryServiceConfigA
RegSetValueA
RegDeleteValueA
RegisterServiceCtrlHandlerA
StartServiceW
QueryServiceLockStatusW
RegSetValueExA
LsaRetrievePrivateData
GetOldestEventLogRecord
OpenEventLogW
GetNumberOfEventLogRecords
LsaOpenPolicy
EnumServicesStatusW
RegisterEventSourceA
OpenServiceA
CreateServiceA
OpenSCManagerA
LockServiceDatabase
OpenEventLogA
NotifyChangeEventLog
UnlockServiceDatabase
EqualSid
NotifyBootConfigStatus
PrivilegeCheck
RegDeleteKeyA
RegDeleteValueW
GetServiceKeyNameA
ClearEventLogA
ChangeServiceConfig2A
InitiateSystemShutdownA
RegSetValueExW
SetServiceStatus
gdi32
AddFontResourceA
SetDIBits
GetViewportExtEx
CreateDCA
GetFontLanguageInfo
EnumFontsA
GetROP2
GdiSetBatchLimit
GetRgnBox
GetICMProfileW
EnumFontFamiliesA
TextOutW
Rectangle
GetBrushOrgEx
ExtCreateRegion
GetNearestColor
BitBlt
ResizePalette
SetBkColor
CreateDIBSection
SetSystemPaletteUse
GetDeviceCaps
GetWindowOrgEx
CreateRectRgnIndirect
CombineRgn
CreatePenIndirect
RealizePalette
SetPaletteEntries
GetCharWidth32A
SetBitmapDimensionEx
GetTextCharsetInfo
CreateCompatibleDC
GetDeviceGammaRamp
GetMetaFileA
CreatePalette
DeleteDC
SetViewportExtEx
CreateRoundRectRgn
EnumFontFamiliesExW
GetSystemPaletteEntries
Sections
.text Size: 88KB - Virtual size: 84KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 40KB - Virtual size: 2.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 388KB - Virtual size: 387KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ