Behavioral task
behavioral1
Sample
3ba897d0c17ee90debaec62b17bb323d_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
3ba897d0c17ee90debaec62b17bb323d_JaffaCakes118
-
Size
128KB
-
MD5
3ba897d0c17ee90debaec62b17bb323d
-
SHA1
eaf8e697d1554984e1ba2a9e49046a77f6dc8c46
-
SHA256
b683ccee257c2edb5dada7ca00e936cfbb7a81e006719afc5c91778188d349e5
-
SHA512
ad552034772f7970c4cc85fcf7b516b281c45630e2ed6e1295fb98479d0a783096ee1df1c164006a20c823f64909e438d23199bc4ea1043dc39f9ce305296937
-
SSDEEP
3072:n9mQrWSB/WM+dCB+IF1G6911I0EDAUQ+iU2r2:n9USBOMNBNF1Hy0EDAUQ+iU2r2
Malware Config
Extracted
gootkit
8888
sslsecurehost.com
securessl256.com
-
vendor_id
8888
Signatures
-
Gootkit family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 3ba897d0c17ee90debaec62b17bb323d_JaffaCakes118
Files
-
3ba897d0c17ee90debaec62b17bb323d_JaffaCakes118.exe windows:5 windows x86 arch:x86
cec901dd4cece3a5835f751a49aba900
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
StrCpyW
StrCmpIW
StrCpyNW
StrCmpW
StrStrIW
StrRChrW
StrDupW
PathMatchSpecW
StrStrA
StrCatW
PathFindFileNameW
psapi
GetProcessImageFileNameA
userenv
CreateEnvironmentBlock
DestroyEnvironmentBlock
GetProfilesDirectoryW
ws2_32
WSAStartup
socket
inet_addr
closesocket
gethostbyname
bind
ntohs
winhttp
WinHttpReceiveResponse
WinHttpSendRequest
WinHttpSetTimeouts
WinHttpAddRequestHeaders
WinHttpQueryHeaders
WinHttpSetOption
WinHttpOpenRequest
WinHttpConnect
WinHttpQueryDataAvailable
WinHttpOpen
WinHttpCloseHandle
WinHttpGetIEProxyConfigForCurrentUser
WinHttpGetProxyForUrl
WinHttpCrackUrl
WinHttpReadData
kernel32
GetFileAttributesW
lstrcmpW
VirtualProtect
GetExitCodeProcess
FindClose
MapViewOfFile
CreateFileMappingW
OpenMutexW
CreateMutexW
SetErrorMode
GetCommandLineW
GetModuleHandleExA
GetModuleFileNameA
GetFileTime
GetSystemTime
SystemTimeToFileTime
GetFileSize
DeleteFileW
LocalAlloc
SetEndOfFile
SetFileTime
RemoveDirectoryW
WriteFile
CreateEventA
GlobalMemoryStatusEx
SetEnvironmentVariableA
GetSystemInfo
TerminateThread
GetSystemDirectoryW
GetEnvironmentVariableA
HeapFree
GetCurrentProcess
lstrlenW
lstrlenA
GetModuleHandleA
GetVersion
GetLastError
CloseHandle
HeapAlloc
GetProcAddress
GetComputerNameW
GetCurrentProcessId
GetProcessHeap
GetModuleHandleW
WideCharToMultiByte
lstrcpyW
GetTickCount
GetComputerNameA
lstrcmpA
Sleep
LoadLibraryA
WriteProcessMemory
SetLastError
ExpandEnvironmentStringsW
TerminateProcess
WaitForSingleObject
ResumeThread
GetExitCodeThread
lstrcatW
GetThreadContext
ReadProcessMemory
CreateProcessW
CreateRemoteThread
IsBadReadPtr
GetShortPathNameW
CreateFileW
VirtualFree
VirtualAlloc
lstrcpyA
HeapReAlloc
GlobalFree
GlobalAlloc
LocalFree
OpenProcess
MultiByteToWideChar
GetLogicalDrives
WaitForMultipleObjects
DeleteAtom
GetCurrentThreadId
IsSystemResumeAutomatic
ExitThread
GetCommandLineA
ProcessIdToSessionId
CreateThread
FindAtomW
FindNextFileW
ReadFile
GetModuleFileNameW
SetFilePointer
lstrcmpiA
ExitProcess
SetEvent
FindFirstFileW
SetEnvironmentVariableW
user32
CreatePopupMenu
ExitWindowsEx
GetCapture
ReleaseCapture
GetClipboardOwner
wsprintfA
GetActiveWindow
CountClipboardFormats
GetProcessWindowStation
GetMessagePos
GetDesktopWindow
wsprintfW
GetClipboardViewer
GetInputState
GetShellWindow
CreateMenu
GetCaretBlinkTime
GetClipboardSequenceNumber
DestroyCaret
GetForegroundWindow
GetKBCodePage
GetDoubleClickTime
CloseClipboard
GetMenuCheckMarkDimensions
GetCursor
GetOpenClipboardWindow
GetFocus
GetMessageExtraInfo
GetMessageTime
GetDialogBaseUnits
advapi32
LookupPrivilegeValueA
RegOpenKeyExA
CheckTokenMembership
FreeSid
OpenProcessToken
SetSecurityDescriptorDacl
SetFileSecurityW
SetEntriesInAclW
InitializeSecurityDescriptor
GetUserNameW
RegOpenKeyW
ConvertStringSecurityDescriptorToSecurityDescriptorA
RegOpenKeyA
SetTokenInformation
CreateProcessAsUserW
GetLengthSid
DuplicateTokenEx
LookupAccountSidW
AdjustTokenPrivileges
RevertToSelf
GetTokenInformation
ConvertSidToStringSidW
RegCreateKeyExW
RegSetValueExW
RegOpenKeyExW
RegDeleteValueW
RegQueryValueExW
RegCreateKeyA
GetUserNameA
RegCloseKey
RegQueryValueExA
GetSidSubAuthorityCount
AllocateAndInitializeSid
GetSidSubAuthority
CreateWellKnownSid
RegSetValueExA
ole32
CoCreateInstance
CoInitialize
CoInitializeEx
CoUninitialize
CoTaskMemFree
Sections
.text Size: 64KB - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 48KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ