Behavioral task
behavioral1
Sample
ede34a68f5a011268f039ef52a8af0c6_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ede34a68f5a011268f039ef52a8af0c6_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
ede34a68f5a011268f039ef52a8af0c6_JaffaCakes118
-
Size
1.1MB
-
MD5
ede34a68f5a011268f039ef52a8af0c6
-
SHA1
a876cc480f5d21d7309158a54d0713f638eab453
-
SHA256
4531eed7c16b11591dc532132257a20b3992bec0960468013e4e75345c9b5781
-
SHA512
3e51529d6a73770f98918c7b039759ca185c994fd6ae0d75bf7b35b507b759c1377cfc7c6caea1c2a0b8baf08d4e59cf9705b63a4b31dadb0e81417715eedc4b
-
SSDEEP
24576:6AlX5rZnsJ39LyjbJkQFMhmC+6GD9Uny/f9uC2:zHnsHyjtk2MYC5GDHFU
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
Files
-
ede34a68f5a011268f039ef52a8af0c6_JaffaCakes118.exe windows:4 windows x86 arch:x86
6d3700c4e08e81f815c03b342751446b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLocalTime
GetModuleFileNameA
CopyFileA
CloseHandle
ReadFile
GetFileSize
IsBadReadPtr
WriteFile
GetCommandLineA
HeapFree
HeapReAlloc
HeapAlloc
ExitProcess
GetModuleHandleA
CreateFileA
GetProcessHeap
GetTempPathA
GetSystemDirectoryA
GetWindowsDirectoryA
GetVersionExA
GetLastError
GetCurrentProcess
MultiByteToWideChar
WideCharToMultiByte
GetStartupInfoA
GetVersion
RtlUnwind
TerminateProcess
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
DeleteCriticalSection
GetCurrentThreadId
TlsSetValue
TlsAlloc
SetLastError
TlsGetValue
GetEnvironmentVariableA
HeapDestroy
HeapCreate
VirtualFree
GetProcAddress
RaiseException
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetCPInfo
GetACP
GetOEMCP
VirtualAlloc
LoadLibraryA
InterlockedDecrement
InterlockedIncrement
SetFilePointer
SetUnhandledExceptionFilter
IsBadCodePtr
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
SetStdHandle
FlushFileBuffers
user32
TranslateMessage
DispatchMessageA
wsprintfA
MessageBoxA
GetMessageA
PeekMessageA
shell32
SHGetSpecialFolderPathA
ShellExecuteA
Sections
.text Size: 40KB - Virtual size: 39KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 104KB - Virtual size: 104KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ