CreateInterface
Static task
static1
Behavioral task
behavioral1
Sample
BaDBoY v5/BaDBoYv5.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
BaDBoY v5/BaDBoYv5.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
BaDBoY v5/BaDBoYv5.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
BaDBoY v5/BaDBoYv5.exe
Resource
win10v2004-20240802-en
General
-
Target
0fe3ce8c67e596faa5b35e72ac99b3b9_JaffaCakes118
-
Size
579KB
-
MD5
0fe3ce8c67e596faa5b35e72ac99b3b9
-
SHA1
32216649e980c65c10a4f868894ace9641909b43
-
SHA256
3f8c83d3a9d47325f63fa8e3d6a55ce37096a20acf37ebae5365a0b0e43d4a99
-
SHA512
aa7c6a5e7723eca7efae634b8c644f44ccda5dca14b1f96e839e7e20c0892c3715872656e15b9574fa8980d869e9a2f24a1d9e6a23e6f72811e01b736bcab283
-
SSDEEP
12288:Wmv01VpAbkhVotjbYsIZx3jJOAOB54Aug5AfXZdj55lzJTBiiqzgC563RuP:WYSPAKVoFksyk547DfDj5538J6B8
Malware Config
Signatures
-
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource unpack001/BaDBoY v5/BaDBoYv5.dll unpack001/BaDBoY v5/BaDBoYv5.exe
Files
-
0fe3ce8c67e596faa5b35e72ac99b3b9_JaffaCakes118.rar
-
BaDBoY v5/BG/background.bmp
-
BaDBoY v5/BaDBoYv5.cfg
-
BaDBoY v5/BaDBoYv5.dll.dll windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Exports
Exports
Sections
.text Size: 1.2MB - Virtual size: 1.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 32KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
BaDBoY v5/BaDBoYv5.exe.exe windows:4 windows x86 arch:x86
4f4f42aaa8936db76e48fd9fc976a785
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetVersion
GetProcAddress
GetModuleHandleA
GlobalFree
ReadProcessMemory
GlobalAlloc
OpenProcess
CloseHandle
SetThreadContext
SuspendThread
Sleep
ResumeThread
WriteProcessMemory
VirtualProtectEx
GetThreadContext
GetExitCodeThread
WaitForSingleObject
CreateRemoteThread
ExitProcess
LoadLibraryA
Process32Next
Process32First
CreateToolhelp32Snapshot
Thread32Next
Thread32First
FindFirstFileA
TerminateProcess
GetModuleFileNameA
GetStringTypeA
LCMapStringW
LCMapStringA
GetStringTypeW
MultiByteToWideChar
GetStartupInfoA
GetCommandLineA
GetCurrentProcess
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
HeapDestroy
HeapCreate
VirtualFree
HeapFree
RtlUnwind
WriteFile
GetCPInfo
GetACP
GetOEMCP
HeapAlloc
VirtualAlloc
HeapReAlloc
user32
DialogBoxParamA
EndDialog
GetAsyncKeyState
MessageBoxA
GetDlgItemTextA
Sections
.text Size: 16KB - Virtual size: 14KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 248KB - Virtual size: 245KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ