Overview
overview
7Static
static
5setup.exe
windows7-x64
7setup.exe
windows10-2004-x64
6RUNME.bat
windows7-x64
5RUNME.bat
windows10-2004-x64
5crack.exe
windows7-x64
5crack.exe
windows10-2004-x64
5install.exe
windows7-x64
5install.exe
windows10-2004-x64
5keygen.exe
windows7-x64
3keygen.exe
windows10-2004-x64
3patch.exe
windows7-x64
3patch.exe
windows10-2004-x64
3Behavioral task
behavioral1
Sample
setup.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
setup.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
RUNME.bat
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
RUNME.bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
crack.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
crack.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
install.exe
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
install.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
keygen.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
keygen.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
patch.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
patch.exe
Resource
win10v2004-20241007-en
General
-
Target
56494b5f468f67400c6fb781ace1754d_JaffaCakes118
-
Size
305KB
-
MD5
56494b5f468f67400c6fb781ace1754d
-
SHA1
a8dc54355cf7c2d55b15a42e2b74c4d050dc8756
-
SHA256
922018410b5d7dabbc2f1a282d160dbffc05c5a4b343710a1486543f21d44dbf
-
SHA512
100251889d46bdd85a8c344a94319ea539c81b7221d0827740227d1f3932a74adeecc8f3a209c3d87bc00468e2a99d370511e0afaa0f9136dc3236860e3058a4
-
SSDEEP
6144:nQyjAAOItDtco849KjegajYOsex1eKor2qOQqm3wFlZCOAnUqw:xj9F7r0igajYOseFoGQqDTAnUqw
Malware Config
Signatures
-
resource yara_rule static1/unpack001/crack.exe upx static1/unpack001/install.exe upx -
Unsigned PE 7 IoCs
Checks for missing Authenticode signature.
resource unpack002/setup.exe unpack001/crack.exe unpack003/out.upx unpack001/install.exe unpack004/out.upx unpack001/keygen.exe unpack001/patch.exe
Files
-
56494b5f468f67400c6fb781ace1754d_JaffaCakes118.rar
-
Fraps_v2.0.0.zip.zip
-
AGAiN.nfo
-
setup.exe.exe windows:4 windows x86 arch:x86
ec9fe2df073f9adb523d740ca14e7bb5
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
ImageList_Create
ord17
ImageList_AddMasked
ImageList_Destroy
kernel32
FindFirstFileA
CloseHandle
SetFileTime
CompareFileTime
GetFileAttributesA
GetTempFileNameA
SearchPathA
GetShortPathNameA
GetFullPathNameA
MoveFileA
lstrcatA
CreateDirectoryA
SetCurrentDirectoryA
SetFileAttributesA
Sleep
CopyFileA
GetFileSize
GetModuleFileNameA
GetModuleHandleA
lstrcpynA
GetCommandLineA
DeleteFileA
GetTickCount
GetUserDefaultLangID
GetDiskFreeSpaceA
GetVersion
GlobalUnlock
GlobalLock
GlobalAlloc
CreateThread
CreateProcessA
RemoveDirectoryA
CreateFileA
SetEndOfFile
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
GetWindowsDirectoryA
lstrcpyA
lstrlenA
GetSystemDirectoryA
MulDiv
SetFilePointer
ReadFile
WriteFile
GetPrivateProfileStringA
FindNextFileA
FindClose
lstrcmpiA
GetEnvironmentVariableA
ExpandEnvironmentStringsA
WritePrivateProfileStringA
GlobalFree
WaitForSingleObject
GetExitCodeProcess
LoadLibraryA
GetProcAddress
FreeLibrary
MultiByteToWideChar
GetCurrentProcess
ExitProcess
GetTempPathA
user32
SetTimer
DestroyWindow
CreateDialogParamA
DialogBoxParamA
GetClassInfoA
CreateWindowExA
SystemParametersInfoA
RegisterClassA
IsWindowEnabled
EndDialog
SetFocus
SetWindowPos
ScreenToClient
GetWindowLongA
EnableWindow
SetClassLongA
GetSysColor
LoadCursorA
SetCursor
GetDlgItemTextA
MapWindowPoints
GetMessagePos
LoadBitmapA
CallWindowProcA
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
TrackPopupMenu
AppendMenuA
CreatePopupMenu
GetSystemMetrics
SetDlgItemTextA
MessageBoxA
SetWindowTextA
PostQuitMessage
ShowWindow
SetForegroundWindow
CharNextA
wsprintfA
CharPrevA
SendMessageTimeoutA
FindWindowExA
IsWindow
GetDlgItem
SetWindowLongA
GetWindowRect
LoadImageA
GetDC
PeekMessageA
ExitWindowsEx
SendMessageA
DefWindowProcA
BeginPaint
GetClientRect
SetRect
FillRect
GetWindowTextA
DrawTextA
EndPaint
DispatchMessageA
gdi32
SetBkColor
GetDeviceCaps
CreateFontIndirectA
CreateSolidBrush
DeleteObject
CreateFontA
SetBkMode
SetTextColor
GetStockObject
SelectObject
advapi32
RegEnumKeyA
RegQueryValueExA
RegSetValueExA
RegCreateKeyA
RegDeleteKeyA
RegOpenKeyExA
RegDeleteValueA
RegCloseKey
RegEnumValueA
shell32
ShellExecuteA
SHGetMalloc
SHGetPathFromIDListA
SHBrowseForFolderA
SHFileOperationA
ole32
OleInitialize
OleUninitialize
CoCreateInstance
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
Sections
.text Size: 23KB - Virtual size: 23KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 142KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
RUNME.bat
-
crack.exe.exe windows:4 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 20KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 5KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:4 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 770B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1024B - Virtual size: 616B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
install.exe.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
LUHW Size: - Virtual size: 52KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
LUHW Size: 7KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 24KB - Virtual size: 21KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
keygen.exe.exe windows:4 windows x86 arch:x86
09d0478591d4f788cb3e5ea416c25237
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
Sections
.text Size: 22KB - Virtual size: 40KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 14KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
patch.exe.exe windows:4 windows x86 arch:x86
5bef038545e081c225032878a6cedf0d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
ShellExecuteExA
Sections
reurfds Size: 26KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE