Behavioral task
behavioral1
Sample
0d90adf112a534946f60ac9b43ca44fa_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0d90adf112a534946f60ac9b43ca44fa_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
0d90adf112a534946f60ac9b43ca44fa_JaffaCakes118
-
Size
136KB
-
MD5
0d90adf112a534946f60ac9b43ca44fa
-
SHA1
0822643413b18c311df1eaca90110f4e6d9f8e6d
-
SHA256
c94ad4db80c7297eba932b4e8f8aa56a06c2f258762c7534d57f355ad35b0398
-
SHA512
1e393db7c5c460f6e21730c803575f78f84213736511076dbc3e5d8db840e613642a42e3a8f6f30b42edc2e80eccd024ae270f359efdd9faa433fb920d14e294
-
SSDEEP
768:cJacCVq76rN44b38OVLJokAgKdxbgWCiskkpZEfjIRqxeve10KGKwYQOL8bWBmE5:oqy2lpSkATdWPEf2qt/3pZgEkYT
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0d90adf112a534946f60ac9b43ca44fa_JaffaCakes118
Files
-
0d90adf112a534946f60ac9b43ca44fa_JaffaCakes118.exe windows:4 windows x86 arch:x86
9d01620fee4be01484427f770494c398
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
modf
strrchr
strtod
_strnicmp
tolower
malloc
realloc
free
toupper
strncmp
strncpy
??3@YAXPAX@Z
??2@YAPAXI@Z
sprintf
_ftol
rand
srand
kernel32
DeleteCriticalSection
GetFileSize
LCMapStringA
GetModuleFileNameA
GetCommandLineA
GetWindowsDirectoryA
GetSystemDirectoryA
GetTempPathA
CreateThread
TerminateThread
CloseHandle
LocalSize
RtlMoveMemory
CreateProcessA
GetThreadContext
ReadProcessMemory
VirtualAllocEx
WriteProcessMemory
VirtualProtectEx
SetThreadContext
ResumeThread
WaitForSingleObject
GetEnvironmentVariableA
TerminateProcess
lstrcpyn
GetProcessHeap
GetModuleHandleA
ExitProcess
HeapAlloc
HeapReAlloc
HeapFree
IsBadReadPtr
GetTickCount
CreateDirectoryA
SetFileAttributesA
WritePrivateProfileStringA
MultiByteToWideChar
WideCharToMultiByte
WriteFile
SetFilePointer
ReadFile
GetStartupInfoA
SetEndOfFile
CreateFileA
user32
PeekMessageA
MsgWaitForMultipleObjects
GetMessageA
TranslateMessage
MessageBoxA
wsprintfA
DispatchMessageA
shell32
SHGetSpecialFolderPathA
ole32
CoUninitialize
CLSIDFromString
CLSIDFromProgID
CoCreateInstance
CoInitialize
OleRun
wininet
InternetConnectA
InternetCloseHandle
HttpOpenRequestA
HttpSendRequestA
InternetReadFile
HttpQueryInfoA
InternetSetCookieA
InternetGetConnectedState
InternetOpenUrlA
InternetOpenA
ntdll
ZwUnmapViewOfSection
oleaut32
SafeArrayCreate
VariantInit
SafeArrayAccessData
SafeArrayUnaccessData
SafeArrayGetElement
VariantChangeType
SafeArrayGetDim
SafeArrayGetLBound
SafeArrayDestroy
VariantClear
SysAllocString
SafeArrayGetUBound
RegisterTypeLi
LoadTypeLi
VarR8FromBool
VarR8FromCy
shlwapi
PathFileExistsA
Sections
.text Size: 52KB - Virtual size: 48KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 72KB - Virtual size: 95KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE