Behavioral task
behavioral1
Sample
BatchDoc 5.5 ƽ/BatchDoc 5.5 ƽⲹ.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
BatchDoc 5.5 ƽ/BatchDoc 5.5 ƽⲹ.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
BatchDoc 5.5 ƽ/BatchDoc55.exe
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
BatchDoc 5.5 ƽ/BatchDoc55.exe
Resource
win10v2004-20241007-en
General
-
Target
564816e85ad67a26fd919c8bdb24c39f_JaffaCakes118
-
Size
917KB
-
MD5
564816e85ad67a26fd919c8bdb24c39f
-
SHA1
36c56a4aa7cd774364d6cb8f04356f0822621a73
-
SHA256
a212ad186ea76f31f488d89132bda971d292e37566264583b3b23781127d8bd3
-
SHA512
5aff569fead5a48ffa88309d81bc4e516232f061a298a760cacd4024cafb4dc98725209371d725879f65edaf13fd528db4844ab7673ebc22cf4607401c0d3397
-
SSDEEP
24576:L3hiC+IBqp/8d4CSfn1jeKgA0SWYPqoya9oeBcBE:7SqW/8d4Rj0EWFoJ9z
Malware Config
Signatures
-
resource yara_rule static1/unpack001/BatchDoc 5.5 ƽ/BatchDoc 5.5 ƽⲹ.exe upx -
Unsigned PE 3 IoCs
Checks for missing Authenticode signature.
resource unpack001/BatchDoc 5.5 ƽ/BatchDoc 5.5 ƽⲹ.exe unpack002/out.upx unpack001/BatchDoc 5.5 ƽ/BatchDoc55.exe
Files
-
564816e85ad67a26fd919c8bdb24c39f_JaffaCakes118.zip
-
BatchDoc 5.5 ƽ/BatchDoc 5.5 ƽⲹ.exe.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 32KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 9KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 457B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
BatchDoc 5.5 ƽ/BatchDoc55.exe.exe windows:4 windows x86 arch:x86
a3cd138f09c17f81fb64526d63cb2df6
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetTempPathA
ExitProcess
DeleteFileA
FreeLibrary
lstrcpyA
GetProcAddress
LoadLibraryA
VirtualFree
CloseHandle
WriteFile
GetWindowsDirectoryA
CreateFileA
lstrcatA
CompareStringA
GetCurrentDirectoryA
lstrlenA
ReadFile
SetFilePointer
VirtualAlloc
GetModuleFileNameA
InterlockedIncrement
GetModuleHandleA
user32
SetCursor
LoadCursorA
wsprintfA
ShowWindow
FindWindowA
MessageBoxA
Sections
.text Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 604B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 1024B - Virtual size: 766B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.Shared Size: 512B - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 924B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 434B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
BatchDoc 5.5 ƽ/SpxImage1.jpg.jpg
-
BatchDoc 5.5 ƽ/˵.txt