Behavioral task
behavioral1
Sample
JaffaCakes118_1bfffc11a687013c79e9ccdcb939e51f2ec01c78d8c6cb5079d81de9cb5da5f5.exe
Resource
win7-20241010-en
General
-
Target
JaffaCakes118_1bfffc11a687013c79e9ccdcb939e51f2ec01c78d8c6cb5079d81de9cb5da5f5
-
Size
3.6MB
-
MD5
d2f38f478367b943632bbb663830c063
-
SHA1
788f79a144edff88e7957fadd45547e162b25339
-
SHA256
1bfffc11a687013c79e9ccdcb939e51f2ec01c78d8c6cb5079d81de9cb5da5f5
-
SHA512
e629645ef4e6cb15b509f5611a9d012c4e70620e911181c82e98b532e1dc8ea2effccdd7592a5f86885389d9c4df166b0e1b695df743f099a591c8f1e6ff8c73
-
SSDEEP
49152:108r2yrqoQYCkeo/O2dGp/XjYc3TEsuu0ShLV6Xsg0oOT5YYBYBITL:yu5DMHhKShLVSsgW
Malware Config
Extracted
cryptbot
veoxjo24.top
morpib02.top
Signatures
-
Cryptbot family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource JaffaCakes118_1bfffc11a687013c79e9ccdcb939e51f2ec01c78d8c6cb5079d81de9cb5da5f5
Files
-
JaffaCakes118_1bfffc11a687013c79e9ccdcb939e51f2ec01c78d8c6cb5079d81de9cb5da5f5.exe windows:6 windows x86 arch:x86
fe5e8263b6e7b06c2d997d485b7f959f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapFree
SetLastError
EnterCriticalSection
GetCurrentProcess
ReleaseSemaphore
GetModuleFileNameW
WaitForMultipleObjects
InitializeCriticalSectionAndSpinCount
LeaveCriticalSection
GetQueuedCompletionStatus
DuplicateHandle
PostQueuedCompletionStatus
CreateEventW
MultiByteToWideChar
Sleep
FormatMessageW
GetLastError
SetEvent
TerminateThread
LoadLibraryA
TlsSetValue
TlsAlloc
CloseHandle
HeapAlloc
QueueUserAPC
SetCurrentDirectoryW
GetWindowsDirectoryW
GetProcAddress
LocalFree
DeleteCriticalSection
ExitProcess
VerSetConditionMask
GetProcessHeap
WideCharToMultiByte
SleepEx
VerifyVersionInfoW
TlsGetValue
TlsFree
FormatMessageA
CreateSemaphoreA
CreateEventA
CreateIoCompletionPort
SetWaitableTimer
GetModuleFileNameA
WaitForSingleObjectEx
WriteConsoleW
FlushFileBuffers
SetStdHandle
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
GetACP
FindNextFileW
FindFirstFileExW
FindClose
HeapSize
GetFileSizeEx
GetConsoleOutputCP
HeapReAlloc
GetFileType
ReadConsoleW
GetConsoleMode
SetFilePointerEx
QueryPerformanceCounter
QueryPerformanceFrequency
ResetEvent
WaitForMultipleObjectsEx
OpenEventA
GetCurrentProcessId
GetCurrentThreadId
ResumeThread
GetModuleHandleA
CreateWaitableTimerA
CreateFileA
CreateFileW
GetFileSize
ReadFile
SetFilePointer
WriteFile
GetStdHandle
GetCurrentDirectoryA
GetCurrentDirectoryW
GetFullPathNameW
GetFullPathNameA
GetVersionExA
IsValidCodePage
IsDBCSLeadByteEx
FreeLibrary
GetModuleHandleW
InitializeSListHead
IsProcessorFeaturePresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsDebuggerPresent
GetStartupInfoW
GetSystemTimeAsFileTime
RaiseException
InitializeSRWLock
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
InitializeCriticalSectionEx
TryEnterCriticalSection
EncodePointer
DecodePointer
LCMapStringEx
GetStringTypeW
GetCPInfo
RtlUnwind
InterlockedPushEntrySList
LoadLibraryExW
CreateThread
ExitThread
FreeLibraryAndExitThread
GetModuleHandleExW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
WaitForSingleObject
user32
MessageBoxA
GetActiveWindow
ws2_32
WSAIoctl
closesocket
WSASend
select
ntohl
listen
WSASetLastError
WSAStringToAddressW
WSASocketW
accept
getsockname
connect
WSARecv
getsockopt
htonl
htons
ioctlsocket
setsockopt
WSAGetLastError
bind
WSACleanup
__WSAFDIsSet
WSAStartup
advapi32
RegEnumKeyExA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
Sections
.text Size: 2.0MB - Virtual size: 2.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1.1MB - Virtual size: 1.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 202KB - Virtual size: 206KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 221KB - Virtual size: 221KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 110KB - Virtual size: 110KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ