@WndListDlg$qpvuiuil
@WndProc$qpvuiuil
__GetExceptDLLinfo
Behavioral task
behavioral1
Sample
bos3od.js
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
bos3od.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
dial.exe
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
dial.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
email.exe
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
email.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
hide.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
hide.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
mutairi.exe
Resource
win7-20240903-en
Target
41a485e69cd19944feabc0eb5e18b990_JaffaCakes118
Size
654KB
MD5
41a485e69cd19944feabc0eb5e18b990
SHA1
92ccf60808782ce0e44d31ba936521c5bcaeedc3
SHA256
abbd19c4017583cb994dc490d709a69336b0bfbb4a3557979afc3e89f7b6ec6d
SHA512
2182062a06315e7b0900f7f5310b945dd121a41db8d0ff51353ea46d97ccefa43d83f60cfa0f3754c322e66b3c91e3e9db00dac03603e1eb1e0b4bc797275ed4
SSDEEP
12288:N01t15XOxB+Tg2hpAttf+XaWPZNvQC41Xzm/68A5+b5h12TsMOcbw00MFnUXb:y31MXXGOtfCbPZNvQCUzN5+v12Yk0Ins
Free utilities often used by attackers which can steal passwords, product keys, etc.
resource | yara_rule |
---|---|
static1/unpack002/out.upx | Nirsoft |
static1/unpack003/out.upx | Nirsoft |
Password recovery tool for various email clients
resource | yara_rule |
---|---|
static1/unpack003/out.upx | MailPassView |
resource | yara_rule |
---|---|
static1/unpack001/dial.com | upx |
static1/unpack001/email.com | upx |
static1/unpack001/mutairi.exe | upx |
Checks for missing Authenticode signature.
resource |
---|
unpack001/dial.com |
unpack002/out.upx |
unpack001/email.com |
unpack003/out.upx |
unpack001/hide.exe |
unpack001/mutairi.exe |
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
@WndListDlg$qpvuiuil
@WndProc$qpvuiuil
__GetExceptDLLinfo
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE