Behavioral task
behavioral1
Sample
ac93ddc96bc621c7049a1fe3f06ccc03_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
ac93ddc96bc621c7049a1fe3f06ccc03_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
ac93ddc96bc621c7049a1fe3f06ccc03_JaffaCakes118
-
Size
196KB
-
MD5
ac93ddc96bc621c7049a1fe3f06ccc03
-
SHA1
c32016b0e430c6cdc4561a5ed269b33badc5de58
-
SHA256
3616cf1a828c6163dd8c97c8757acc3ec98d5422b3d3373d384b4f6537804121
-
SHA512
762ca7bf3fb20fd05411ed9c32a500262e2d2cdb7bfbae6ae6d84398e203269d9cbb1e318db855b02b595c0c038f1f67d1df87fa426d2bbaad743a0211fced24
-
SSDEEP
3072:RPqVbN7FktlAv7zBsRLMR+utSyO5XZ2Fxo9JIF8vnyPZUZ3kAXSuxty:RPqVnktlc7zCeZtpMZ2Fxo5vyGXLe
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
Processes:
resource yara_rule sample family_blackmoon -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource ac93ddc96bc621c7049a1fe3f06ccc03_JaffaCakes118
Files
-
ac93ddc96bc621c7049a1fe3f06ccc03_JaffaCakes118.exe windows:4 windows x86 arch:x86
92403a0fd5d3447083ae5509570d1093
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LCMapStringW
VirtualAlloc
IsBadWritePtr
SetUnhandledExceptionFilter
GetStringTypeA
GetStringTypeW
IsBadCodePtr
SetStdHandle
LCMapStringA
GetProcAddress
FreeLibrary
GetCommandLineA
DeleteFileA
ReadFile
GetFileSize
CreateFileA
WriteFile
CloseHandle
CreateDirectoryA
GetPrivateProfileStringA
GetModuleFileNameA
IsBadReadPtr
HeapFree
HeapReAlloc
VirtualFree
HeapCreate
HeapDestroy
GetVersionExA
GetEnvironmentVariableA
GetFileType
HeapAlloc
ExitProcess
GetModuleHandleA
GetProcessHeap
CreateThread
LoadLibraryA
Process32Next
CreateToolhelp32Snapshot
GetCurrentProcessId
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
WideCharToMultiByte
MultiByteToWideChar
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
SetFilePointer
SystemTimeToFileTime
GetFileAttributesA
GetCurrentDirectoryA
LocalFileTimeToFileTime
SetFileTime
GetCurrentThreadId
GetCurrentThread
lstrcmpiA
lstrcmpA
GlobalDeleteAtom
GlobalAlloc
GlobalLock
LocalAlloc
LocalFree
InitializeCriticalSection
TlsAlloc
DeleteCriticalSection
GlobalFree
GlobalUnlock
GlobalHandle
TlsFree
LeaveCriticalSection
GlobalReAlloc
EnterCriticalSection
TlsSetValue
LocalReAlloc
TlsGetValue
lstrcpynA
lstrlenA
GlobalFlags
InterlockedDecrement
WritePrivateProfileStringA
lstrcatA
lstrcpyA
InterlockedIncrement
SetLastError
GetLastError
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
GetVersion
GetProcessVersion
SetErrorMode
GetCurrentProcess
FlushFileBuffers
GetCPInfo
GetOEMCP
GetStartupInfoA
RtlUnwind
TerminateProcess
RaiseException
HeapSize
GetACP
user32
LoadStringA
DestroyMenu
GetSysColorBrush
LoadCursorA
LoadIconA
MapWindowPoints
GetSysColor
AdjustWindowRectEx
GetClientRect
CopyRect
PeekMessageA
GetMessageA
TranslateMessage
DispatchMessageA
wsprintfA
MessageBoxA
CharUpperA
PostQuitMessage
PostMessageA
SendMessageA
SetCursor
EnableWindow
GetWindowLongA
IsWindowEnabled
GetLastActivePopup
GetParent
SetWindowsHookExA
GetCursorPos
IsWindowVisible
ValidateRect
CallNextHookEx
GetKeyState
GetActiveWindow
GetNextDlgTabItem
GetFocus
EnableMenuItem
CheckMenuItem
SetMenuItemBitmaps
ModifyMenuA
GetMenuState
LoadBitmapA
GetMenuCheckMarkDimensions
GetClassNameA
PtInRect
GetWindowRect
GetDlgCtrlID
GetWindow
ClientToScreen
SetWindowTextA
GetWindowTextA
UnhookWindowsHookEx
GetMenuItemCount
GetDC
ReleaseDC
TabbedTextOutA
DrawTextA
GrayStringA
GetDlgItem
SetWindowLongA
SetWindowPos
ShowWindow
SetFocus
GetSystemMetrics
GetWindowPlacement
IsIconic
SystemParametersInfoA
RegisterWindowMessageA
SetForegroundWindow
GetForegroundWindow
GetMessagePos
GetMessageTime
DefWindowProcA
RemovePropA
CallWindowProcA
GetPropA
SetPropA
GetClassLongA
CreateWindowExA
DestroyWindow
GetMenuItemID
GetSubMenu
GetMenu
RegisterClassA
GetClassInfoA
WinHelpA
GetCapture
GetTopWindow
UnregisterClassA
ws2_32
WSACleanup
inet_ntoa
WSAStartup
inet_addr
gethostbyname
wininet
InternetCloseHandle
InternetReadFile
HttpQueryInfoA
InternetOpenUrlA
InternetOpenA
gdi32
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetDeviceCaps
GetObjectA
GetStockObject
CreateBitmap
DeleteObject
DeleteDC
SaveDC
RestoreDC
SelectObject
SetBkColor
SetTextColor
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
GetClipBox
winspool.drv
ClosePrinter
OpenPrinterA
DocumentPropertiesA
advapi32
RegCreateKeyExA
RegCloseKey
RegSetValueExA
RegOpenKeyExA
comctl32
ord17
icmp
IcmpCreateFile
IcmpSendEcho
IcmpCloseHandle
shlwapi
PathFileExistsA
Sections
.text Size: 140KB - Virtual size: 136KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 28KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 87KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE