Behavioral task
behavioral1
Sample
f9c59bdbba347bec2b0e2638ac205ff6_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
f9c59bdbba347bec2b0e2638ac205ff6_JaffaCakes118
-
Size
96KB
-
MD5
f9c59bdbba347bec2b0e2638ac205ff6
-
SHA1
eadac78e46d5e280d83a9235e385538aeb5e9e9e
-
SHA256
cfed482a56459322e4ae214148847b6006dceaebc728160fa500f637c87d93d8
-
SHA512
bfcbf5341ce6536cc68c7db8f74d152c34e31eb7fd374d0526ce0bdc2b07642ec33581d2dd5ffaa6361f528a3af32db60e32c85d7bd70b827c6a96f3414e608b
-
SSDEEP
1536:FUuqVmx1AJsF34AWIyQIxQpPih07qo6LR+6CBjXO1IK3hrDNljWbaSQVpv/C:SjVeWdoyhID7qoa+6CBK1IChrDNlxS
Malware Config
Signatures
-
Detect Lumma Stealer payload V4 1 IoCs
Processes:
resource yara_rule sample family_lumma_v4 -
Lumma family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource f9c59bdbba347bec2b0e2638ac205ff6_JaffaCakes118
Files
-
f9c59bdbba347bec2b0e2638ac205ff6_JaffaCakes118.exe windows:4 windows x86 arch:x86
7bb5ebbcd42daa00b85f80c2482cac2a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleA
GetProcAddress
LoadLibraryA
GetTickCount
GetModuleFileNameA
QueryPerformanceCounter
QueryPerformanceFrequency
GetTimeFormatA
GetLocalTime
CreateThread
ExpandEnvironmentStringsA
GetLastError
GetTempPathA
CreateFileA
DeleteFileA
TerminateThread
GetVersionExA
GlobalMemoryStatus
FreeLibrary
MultiByteToWideChar
WideCharToMultiByte
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
CreateMutexA
CopyFileA
Sleep
GetSystemDirectoryA
CloseHandle
WriteFile
SetEndOfFile
GetEnvironmentStringsW
GetEnvironmentStrings
RtlUnwind
GetCommandLineA
GetStartupInfoA
HeapAlloc
HeapFree
GetCurrentProcess
GetACP
GetCPInfo
LCMapStringW
LCMapStringA
GetStringTypeW
GetStringTypeA
FlushFileBuffers
SetStdHandle
SetFilePointer
GetOEMCP
CreateProcessA
ExitProcess
GetFileType
GetStdHandle
SetHandleCount
GetVersion
VirtualAlloc
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
HeapReAlloc
VirtualFree
HeapCreate
HeapDestroy
ReadFile
TerminateProcess
user32
SendMessageA
FindWindowA
mpr
WNetCancelConnection2A
WNetAddConnection2A
advapi32
RegSetValueExA
RegCreateKeyExA
RegCloseKey
RegOpenKeyExA
RegDeleteValueA
RegQueryValueExA
shell32
ShellExecuteA
ws2_32
recv
__WSAFDIsSet
WSAAsyncSelect
ntohl
ioctlsocket
select
getsockname
inet_ntoa
gethostbyaddr
bind
listen
accept
WSASocketA
setsockopt
htonl
inet_addr
gethostbyname
htons
socket
connect
send
WSAStartup
WSACleanup
closesocket
WSAGetLastError
sendto
wininet
InternetOpenUrlA
InternetOpenA
InternetReadFile
InternetCloseHandle
Sections
.text Size: 55KB - Virtual size: 55KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 35KB - Virtual size: 157KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE