Behavioral task
behavioral1
Sample
ae5e5d25a6e61c7044eadc69d8b0726e_JaffaCakes118.exe
Resource
win7-20240611-en
General
-
Target
ae5e5d25a6e61c7044eadc69d8b0726e_JaffaCakes118
-
Size
116KB
-
MD5
ae5e5d25a6e61c7044eadc69d8b0726e
-
SHA1
39f9bfda863daa94aaa9bad6e7239cf98f218742
-
SHA256
89e7894fac5247b216bcb0393377b8f5b6e0a30fa9e88cb221fabb5540e38ca2
-
SHA512
743980b50624adedf3fc2ad22ed33207b0c2d05f4f53c21e5911d9c7e56407c9eac9c0208fe80237cc3098aa305a9f0c92a0356d2880844c3dec4f7291c340ab
-
SSDEEP
3072:PzEqV6B1jHa6dtJ10jgvzcgi+oG/j9iaMP2s/HIID2:PLV6Bta6dtJmakIM5R2
Malware Config
Extracted
nanocore
-
activate_away_mode
false
- backup_connection_host
- backup_dns_server
-
buffer_size
0
-
build_time
0001-01-01T00:00:00Z
-
bypass_user_account_control
false
- bypass_user_account_control_data
-
clear_access_control
false
-
clear_zone_identifier
false
-
connect_delay
0
-
connection_port
0
- default_group
-
enable_debug_mode
false
-
gc_threshold
0
-
keep_alive_timeout
0
-
keyboard_logging
false
-
lan_timeout
0
-
max_packet_size
0
- mutex
-
mutex_timeout
0
-
prevent_system_sleep
false
- primary_connection_host
- primary_dns_server
-
request_elevation
false
-
restart_delay
0
-
run_delay
0
-
run_on_startup
false
-
set_critical_process
false
-
timeout_interval
0
-
use_custom_dns_server
false
- version
-
wan_timeout
0
Signatures
-
Nanocore family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource ae5e5d25a6e61c7044eadc69d8b0726e_JaffaCakes118
Files
-
ae5e5d25a6e61c7044eadc69d8b0726e_JaffaCakes118.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 114KB - Virtual size: 113KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 704B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ