Behavioral task
behavioral1
Sample
JaffaCakes118_68346666256e59cfa93d8a7eccd42ad036f42b2fec3836665515aa1ae5d6170e.exe
Resource
win7-20241010-en
General
-
Target
JaffaCakes118_68346666256e59cfa93d8a7eccd42ad036f42b2fec3836665515aa1ae5d6170e
-
Size
3.6MB
-
MD5
5582206c68e0712abac609eba6b33873
-
SHA1
227a8a025f2d7d4e77f4145913bb8a214b14fcfe
-
SHA256
68346666256e59cfa93d8a7eccd42ad036f42b2fec3836665515aa1ae5d6170e
-
SHA512
4799128d3a69f0ce35462b5c69403158a7811f41e3bd9a0c9dd3fb97a6c4df190f8ae0e3f72ebccb30e12dc29b264cab310ace1ea0ddaebd86d7b24beb8ebb85
-
SSDEEP
49152:jpLy2YCqByztofOOZBGj/SVAE+hZiqSDYvOGUyUMv8y7aT4Frqgf8IK:jlh8rC4mOGUyl8yLqgf
Malware Config
Extracted
cryptbot
cemzau77.top
morvuy07.top
-
payload_url
http://bojpyv10.top/download.php?file=lv.exe
Signatures
-
Cryptbot family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource JaffaCakes118_68346666256e59cfa93d8a7eccd42ad036f42b2fec3836665515aa1ae5d6170e
Files
-
JaffaCakes118_68346666256e59cfa93d8a7eccd42ad036f42b2fec3836665515aa1ae5d6170e.exe windows:6 windows x86 arch:x86
fe5e8263b6e7b06c2d997d485b7f959f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapFree
SetLastError
EnterCriticalSection
GetCurrentProcess
ReleaseSemaphore
GetModuleFileNameW
WaitForMultipleObjects
InitializeCriticalSectionAndSpinCount
LeaveCriticalSection
GetQueuedCompletionStatus
DuplicateHandle
PostQueuedCompletionStatus
CreateEventW
MultiByteToWideChar
Sleep
FormatMessageW
GetLastError
SetEvent
TerminateThread
LoadLibraryA
TlsSetValue
TlsAlloc
CloseHandle
HeapAlloc
QueueUserAPC
SetCurrentDirectoryW
GetWindowsDirectoryW
GetProcAddress
LocalFree
DeleteCriticalSection
ExitProcess
VerSetConditionMask
GetProcessHeap
WideCharToMultiByte
SleepEx
VerifyVersionInfoW
TlsGetValue
TlsFree
FormatMessageA
CreateSemaphoreA
CreateEventA
CreateIoCompletionPort
SetWaitableTimer
GetModuleFileNameA
WaitForSingleObjectEx
WriteConsoleW
FlushFileBuffers
SetStdHandle
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
GetACP
FindNextFileW
FindFirstFileExW
FindClose
HeapSize
GetFileSizeEx
GetConsoleOutputCP
HeapReAlloc
GetFileType
ReadConsoleW
GetConsoleMode
SetFilePointerEx
QueryPerformanceCounter
QueryPerformanceFrequency
ResetEvent
WaitForMultipleObjectsEx
OpenEventA
GetCurrentProcessId
GetCurrentThreadId
ResumeThread
GetModuleHandleA
CreateWaitableTimerA
CreateFileA
CreateFileW
GetFileSize
ReadFile
SetFilePointer
WriteFile
GetStdHandle
GetCurrentDirectoryA
GetCurrentDirectoryW
GetFullPathNameW
GetFullPathNameA
GetVersionExA
IsValidCodePage
IsDBCSLeadByteEx
FreeLibrary
GetModuleHandleW
InitializeSListHead
IsProcessorFeaturePresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsDebuggerPresent
GetStartupInfoW
GetSystemTimeAsFileTime
RaiseException
InitializeSRWLock
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
InitializeCriticalSectionEx
TryEnterCriticalSection
EncodePointer
DecodePointer
LCMapStringEx
GetStringTypeW
GetCPInfo
RtlUnwind
InterlockedPushEntrySList
LoadLibraryExW
CreateThread
ExitThread
FreeLibraryAndExitThread
GetModuleHandleExW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
WaitForSingleObject
user32
MessageBoxA
GetActiveWindow
ws2_32
WSAIoctl
closesocket
WSASend
select
ntohl
listen
WSASetLastError
WSAStringToAddressW
WSASocketW
accept
getsockname
connect
WSARecv
getsockopt
htonl
htons
ioctlsocket
setsockopt
WSAGetLastError
bind
WSACleanup
__WSAFDIsSet
WSAStartup
advapi32
RegEnumKeyExA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
Sections
.text Size: 2.0MB - Virtual size: 2.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1.1MB - Virtual size: 1.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 208KB - Virtual size: 208KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 208KB - Virtual size: 208KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 112KB - Virtual size: 112KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ