Behavioral task
behavioral1
Sample
084edcfd632fea42933e3020cfd485aa_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
084edcfd632fea42933e3020cfd485aa_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
084edcfd632fea42933e3020cfd485aa_JaffaCakes118
-
Size
136KB
-
MD5
084edcfd632fea42933e3020cfd485aa
-
SHA1
2e3d0de63a61054ca20ce933a7fcc869a269f8b2
-
SHA256
14063ce13cf7e4ca37b2c63cca48b05062e09a31af88723724c0a96a6cc4e8b3
-
SHA512
bac8e929cd303589eb501ac03fc0721c178d851eec369dcf9f644bc7c3f20a6c80de3f9e0a66eb0b36d97524231ecf2f2697b21516edc11c8ca19aa5eff89eef
-
SSDEEP
3072:FtWeQ2cPCUwu5JfBlzSSY/i26o5Y7OqUm:FRQ9PZwujplzSSY/iM5Y5
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 084edcfd632fea42933e3020cfd485aa_JaffaCakes118
Files
-
084edcfd632fea42933e3020cfd485aa_JaffaCakes118.exe windows:4 windows x86 arch:x86
7015bdac33a778610cbb5cf33423e440
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
free
modf
strrchr
??3@YAXPAX@Z
??2@YAPAXI@Z
sprintf
_ftol
rand
srand
kernel32
GetWindowsDirectoryA
GetSystemDirectoryA
GetTempPathA
LocalSize
RtlMoveMemory
CreateProcessA
GetThreadContext
ReadProcessMemory
VirtualAllocEx
WriteProcessMemory
VirtualProtectEx
SetThreadContext
ResumeThread
WaitForSingleObject
CloseHandle
GetEnvironmentVariableA
TerminateProcess
lstrcpyn
GetProcessHeap
ExitProcess
HeapAlloc
HeapReAlloc
HeapFree
IsBadReadPtr
GetTickCount
CreateDirectoryA
DeleteCriticalSection
MultiByteToWideChar
WideCharToMultiByte
WriteFile
CreateFileA
SetFileAttributesA
GetStartupInfoA
GetCommandLineA
GetModuleFileNameA
CreateThread
GetModuleHandleA
WritePrivateProfileStringA
user32
MessageBoxA
wsprintfA
DispatchMessageA
TranslateMessage
GetMessageA
PeekMessageA
shell32
SHGetSpecialFolderPathA
ole32
CoUninitialize
CLSIDFromProgID
CLSIDFromString
CoCreateInstance
CoInitialize
OleRun
wininet
InternetGetConnectedState
InternetReadFile
InternetOpenUrlA
InternetOpenA
ntdll
ZwUnmapViewOfSection
oleaut32
VariantChangeType
SafeArrayDestroy
VariantClear
SysAllocString
SafeArrayCreate
RegisterTypeLi
LoadTypeLi
VarR8FromBool
VarR8FromCy
SafeArrayGetElement
SafeArrayGetDim
SafeArrayUnaccessData
SafeArrayAccessData
VariantInit
SafeArrayGetUBound
SafeArrayGetLBound
shlwapi
PathFileExistsA
Sections
.text Size: 32KB - Virtual size: 30KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 92KB - Virtual size: 114KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE