Overview
overview
3Static
static
3Install.exe
windows7-x64
Install.exe
windows10-2004-x64
�...־.vbs
windows7-x64
1�...־.vbs
windows10-2004-x64
1ά�....0.lnk
windows7-x64
3ά�....0.lnk
windows10-2004-x64
3Ա�...��.url
windows7-x64
1Ա�...��.url
windows10-2004-x64
1ļMD...��.exe
windows7-x64
3ļMD...��.exe
windows10-2004-x64
3Static task
static1
Behavioral task
behavioral1
Sample
Install.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Install.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
־.vbs
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
־.vbs
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
άԭ_άԭ_V6.0.lnk
Resource
win7-20240729-en
Behavioral task
behavioral6
Sample
άԭ_άԭ_V6.0.lnk
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
Ա.url
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
Ա.url
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
ļMD5Ч鹤.exe
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
ļMD5Ч鹤.exe
Resource
win10v2004-20241007-en
General
-
Target
5748f8e03dd7a56dd0d7bda0314246ff_JaffaCakes118
-
Size
1.1MB
-
MD5
5748f8e03dd7a56dd0d7bda0314246ff
-
SHA1
23bc13ff2285257fea0e6514b06488a63a823ef3
-
SHA256
f08b89e39ab0bd4ae38d04706ae82456c29a82aec8fd48791d5e92f88f2343f4
-
SHA512
cd6cb204d52049455533acd8ecb37edac661cce9272fd82c82bc48c7df64600c0cb6b4ea9d34171518455a8886eee6b616ac6639c9ad21f4b6708aebff111528
-
SSDEEP
24576:v3BTWdjNSJEBAzHXXR3EbVTG/loUqZmTLi9ivlTqGJG7wsLkAoE:v3B6djo1XKZG2Q8RAG7wbK
Malware Config
Signatures
-
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource unpack001/Install.exe unpack001/ļMD5Ч鹤.exe
Files
-
5748f8e03dd7a56dd0d7bda0314246ff_JaffaCakes118.zip
-
Install.exe.exe windows:4 windows x86 arch:x86
9af3bf862e3012375f9d872d0f85fe77
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mfc80
ord6275
ord5073
ord1908
ord5152
ord4237
ord1402
ord3946
ord1617
ord1620
ord5915
ord6725
ord1570
ord2091
ord4099
ord1484
ord1933
ord6266
ord1397
ord657
ord3057
ord1892
ord1794
ord6236
ord762
ord605
ord784
ord310
ord354
ord3182
ord4262
ord5203
ord4244
ord1401
ord5912
ord6724
ord1551
ord1670
ord1671
ord2020
ord4890
ord4735
ord5182
ord4580
ord1123
ord630
ord3997
ord3038
ord5491
ord2021
ord385
ord3406
ord3641
ord629
ord1439
ord6288
ord5625
ord5323
ord5089
ord384
ord3934
ord2903
ord1774
ord3683
ord4541
ord566
ord3333
ord4481
ord2838
ord5566
ord5213
ord5230
ord4568
ord3948
ord5226
ord5224
ord2931
ord1920
ord4185
ord5382
ord6219
ord5102
ord1010
ord3806
ord5583
ord2018
ord2063
ord4326
ord6276
ord3801
ord6278
ord4014
ord4038
ord757
ord760
ord2322
ord2248
ord1934
ord3210
ord3161
ord602
ord587
ord658
ord2468
ord911
ord865
ord4081
ord1054
ord741
ord1614
ord4104
ord6067
ord1185
ord5716
ord1084
ord2371
ord1903
ord3317
ord4240
ord1591
ord2095
ord3164
ord4232
ord1545
ord2086
ord1063
ord3230
ord2958
ord4238
ord2092
ord3879
ord347
ord709
ord501
ord5746
ord2495
ord2882
ord4109
ord745
ord4108
ord2271
ord557
ord3795
ord2654
ord5873
ord266
ord2164
ord2657
ord3875
ord4035
ord2272
ord3761
ord3596
ord5214
ord3403
ord4722
ord4282
ord1600
ord5960
ord5235
ord5233
ord923
ord928
ord932
ord930
ord934
ord2390
ord2410
ord2394
ord2400
ord2398
ord2396
ord2413
ord2408
ord2392
ord2415
ord2403
ord2385
ord2387
ord2405
ord2178
ord2172
ord1522
ord6279
ord3802
ord6277
ord3345
ord4967
ord1362
ord5175
ord1964
ord1656
ord1655
ord1599
ord5200
ord2537
ord2731
ord2835
ord4307
ord2714
ord2862
ord2540
ord2646
ord2533
ord2991
ord3718
ord3719
ord3709
ord2644
ord3949
ord4486
ord4261
ord3229
ord572
ord781
ord1482
ord6118
ord6703
ord299
ord2902
ord1489
ord4212
ord876
ord265
ord304
ord297
ord578
ord3832
ord764
ord1207
msvcr80
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_configthreadlocale
_initterm_e
_initterm
_acmdln
exit
_ismbblead
_XcptFilter
?terminate@@YAXXZ
_cexit
__getmainargs
_amsg_exit
_except_handler4_common
_decode_pointer
__CxxFrameHandler3
memset
_invalid_parameter_noinfo
??0exception@std@@QAE@ABQBD@Z
_setmbcp
_stricmp
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_crt_debugger_hook
_invoke_watson
_exit
?what@exception@std@@UBEPBDXZ
??1exception@std@@UAE@XZ
??0exception@std@@QAE@XZ
_CxxThrowException
??0exception@std@@QAE@ABV01@@Z
__argv
__argc
sprintf
memcpy
_controlfp_s
_onexit
_lock
_encode_pointer
__dllonexit
_unlock
strncpy
strstr
malloc
free
atoi
kernel32
GetDiskFreeSpaceA
InterlockedExchange
SizeofResource
InterlockedCompareExchange
GetStartupInfoA
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
FindResourceA
LoadResource
CloseHandle
ReadFile
CreateFileA
GetSystemDirectoryA
MultiByteToWideChar
WideCharToMultiByte
lstrlenW
lstrlenA
GetWindowsDirectoryA
DeviceIoControl
MoveFileA
GetCurrentProcess
WriteFile
SetFilePointer
GetLastError
DeleteFileA
DefineDosDeviceA
GetVolumeInformationA
GetDiskFreeSpaceExA
Sleep
GetLogicalDriveStringsA
GetACP
GetLocaleInfoA
GetThreadLocale
GetVersionExA
GetDriveTypeA
user32
GetSystemMetrics
SetCursor
LoadIconA
GetMessagePos
EnableWindow
SendMessageA
wsprintfW
LoadCursorA
ScreenToClient
GetClientRect
IsIconic
GetSystemMenu
PostMessageA
AppendMenuA
DrawIcon
ExitWindowsEx
MessageBoxA
gdi32
BitBlt
advapi32
OpenSCManagerA
CreateServiceA
CloseServiceHandle
NotifyBootConfigStatus
RegCreateKeyA
RegQueryValueExA
RegSetValueExA
RegCloseKey
RegDeleteKeyA
RegOpenKeyA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
shell32
ShellExecuteA
SHGetSpecialFolderPathA
ole32
CoUninitialize
CoInitialize
msvcp80
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?c_str@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEPBDXZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
Sections
.text Size: 56KB - Virtual size: 54KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 384KB - Virtual size: 382KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
Install6.0.0.0714.jpg.jpg
-
־.txt.vbs
-
ź˵.txt
-
άԭ_άԭ_V6.0.lnk.lnk
-
Ա.url.url
-
ļMD5Ч鹤.exe.exe windows:4 windows x86 arch:x86
65ae5cf17140aeaf91e3e9911da0ee3e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcAddress
LoadLibraryA
CloseHandle
WriteFile
CreateDirectoryA
GetTempPathA
ReadFile
SetFilePointer
CreateFileA
GetModuleFileNameA
GetStringTypeA
LCMapStringW
LCMapStringA
HeapAlloc
HeapFree
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
ExitProcess
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
RtlUnwind
GetCPInfo
GetACP
GetOEMCP
MultiByteToWideChar
GetStringTypeW
user32
MessageBoxA
wsprintfA
Sections
.text Size: 24KB - Virtual size: 22KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 84KB - Virtual size: 84KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ