Behavioral task
behavioral1
Sample
34954423ec92b2354dc7458bb1a43dfb_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
34954423ec92b2354dc7458bb1a43dfb_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
34954423ec92b2354dc7458bb1a43dfb_JaffaCakes118
-
Size
356KB
-
MD5
34954423ec92b2354dc7458bb1a43dfb
-
SHA1
fa2040e8fccdcd48291a0bbeeeed458e0925736d
-
SHA256
236598b83174bb79ca55cfa149e195fcccf0f0afd8761211a53e982812ea0cfd
-
SHA512
3fca59b46a3b13910e3a91156485cc763fbfa30f68edffd3a84666dfb7ca064645bc468bfdbdca3ecb323caf801c5759b942f724dd6c0626918bec83f35ce4eb
-
SSDEEP
6144:OEREeAZLa8jJpZfRtPWwcZAO5Fffgh/hYFXIlQ:OEREe6La8jJpZfHWweff8/0IW
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 34954423ec92b2354dc7458bb1a43dfb_JaffaCakes118
Files
-
34954423ec92b2354dc7458bb1a43dfb_JaffaCakes118.exe windows:4 windows x86 arch:x86
5f2e60200fffb9e4f846b571908fbb7a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
_strnicmp
strncpy
_ftol
strrchr
??3@YAXPAX@Z
??2@YAPAXI@Z
strncmp
kernel32
GetWindowsDirectoryA
GetSystemDirectoryA
GetTempPathA
LocalSize
RtlMoveMemory
CreateProcessA
GetThreadContext
ReadProcessMemory
VirtualAllocEx
WriteProcessMemory
VirtualProtectEx
SetThreadContext
ResumeThread
WaitForSingleObject
CloseHandle
GetEnvironmentVariableA
TerminateProcess
lstrcpyn
CreateToolhelp32Snapshot
Process32First
lstrlenA
Process32Next
OpenProcess
CreateWaitableTimerA
SetWaitableTimer
GetProcessHeap
GetModuleHandleA
ExitProcess
HeapAlloc
HeapReAlloc
HeapFree
IsBadReadPtr
WriteFile
CreateFileA
DeleteFileA
MultiByteToWideChar
WideCharToMultiByte
GetCommandLineA
GetModuleFileNameA
user32
MsgWaitForMultipleObjects
MessageBoxA
wsprintfA
DispatchMessageA
TranslateMessage
GetMessageA
PeekMessageA
shell32
SHGetSpecialFolderPathA
StrCmpNIA
ole32
CLSIDFromString
CLSIDFromProgID
CoCreateInstance
OleRun
CoInitialize
CoUninitialize
ntdll
ZwUnmapViewOfSection
oleaut32
SafeArrayGetDim
SafeArrayGetLBound
SafeArrayGetUBound
VariantInit
SafeArrayAccessData
SafeArrayDestroy
VariantClear
SysAllocString
SafeArrayCreate
RegisterTypeLi
LoadTypeLi
VariantChangeType
VarR8FromBool
VarR8FromCy
SafeArrayGetElement
SafeArrayUnaccessData
Sections
.text Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 316KB - Virtual size: 339KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE