Behavioral task
behavioral1
Sample
JaffaCakes118_b7cda70cbb94b6118791ca56c8f3f6554fd5defbb194bd8bd963654c9164d9fc.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_b7cda70cbb94b6118791ca56c8f3f6554fd5defbb194bd8bd963654c9164d9fc
-
Size
275KB
-
MD5
cc2eb1c47b888609af9f408aa765c09a
-
SHA1
7c548ca820cd1b992ec7f879fa83ff4678b047be
-
SHA256
b7cda70cbb94b6118791ca56c8f3f6554fd5defbb194bd8bd963654c9164d9fc
-
SHA512
0808b78730915e298975512b07d5a71cabe0cc3275d24835e2729e31dc98bbecf335e29758f31bd03050ab4032adca7f60b0de14253d7eb10615f6e0dc9d38c0
-
SSDEEP
6144:EMbC0SbzJjbSLPWstc7e72gk6ZVxw4ufGxs4lDWyWZsPGhOikTuid8umn6Bg:EG/CzJxgk4w4ufGJlDFWZsbikTuidB+j
Malware Config
Extracted
cryptbot
cemahq15.top
moresh01.top
-
payload_url
http://bojwfi01.top/download.php?file=lv.exe
Signatures
-
Cryptbot family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource JaffaCakes118_b7cda70cbb94b6118791ca56c8f3f6554fd5defbb194bd8bd963654c9164d9fc
Files
-
JaffaCakes118_b7cda70cbb94b6118791ca56c8f3f6554fd5defbb194bd8bd963654c9164d9fc.exe windows:6 windows x86 arch:x86
7e5e2f20b4ba05f10dfbbafb0fc9054a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetComputerNameW
GlobalMemoryStatusEx
GetFileSizeEx
UnmapViewOfFile
CreateFileMappingW
MapViewOfFile
ReadFile
WriteFile
SetFilePointer
GetFileInformationByHandle
FileTimeToSystemTime
GetLocalTime
LocalFree
SystemTimeToFileTime
WideCharToMultiByte
GetTickCount
GetPrivateProfileStringW
ExitProcess
SetEndOfFile
WriteConsoleW
HeapReAlloc
HeapSize
FlushFileBuffers
GetStringTypeW
GetUserDefaultLocaleName
GetSystemInfo
CloseHandle
DeleteFileW
FindClose
Sleep
GetFileAttributesW
CreateFileW
LocalAlloc
GetLocaleInfoW
GetFileSize
GetModuleFileNameW
RemoveDirectoryW
FindNextFileW
FindFirstFileW
CreateDirectoryW
CopyFileW
GetProcessHeap
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
MultiByteToWideChar
GetCommandLineW
GetCommandLineA
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindFirstFileExW
GetTimeZoneInformation
LCMapStringW
DecodePointer
CompareStringW
GetTimeFormatW
GetDateFormatW
ReadConsoleW
SetStdHandle
ExpandEnvironmentStringsW
IsProcessorFeaturePresent
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
GetModuleHandleW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
GetCurrentProcess
TerminateProcess
RtlUnwind
RaiseException
GetLastError
SetLastError
EncodePointer
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
GetProcAddress
LoadLibraryExW
GetModuleHandleExW
GetStdHandle
HeapFree
HeapAlloc
GetFileType
GetConsoleCP
GetConsoleMode
SetFilePointerEx
user32
GetKeyboardLayoutList
GetWindowRect
GetSystemMetrics
GetDesktopWindow
GetWindowDC
gdi32
GetDeviceCaps
BitBlt
SaveDC
SelectObject
CreateDIBSection
CreateCompatibleDC
DeleteDC
RestoreDC
DeleteObject
advapi32
GetUserNameW
RegCloseKey
RegEnumKeyExW
RegOpenKeyExW
RegQueryValueExW
shell32
ShellExecuteW
SHFileOperationW
gdiplus
GdipGetImageEncodersSize
GdipSaveImageToFile
GdipDisposeImage
GdipCreateBitmapFromHBITMAP
GdipCloneImage
GdipGetImageEncoders
GdiplusShutdown
GdiplusStartup
GdipFree
GdipAlloc
wininet
HttpEndRequestW
InternetOpenW
HttpSendRequestExW
HttpAddRequestHeadersA
InternetConnectW
HttpOpenRequestW
InternetWriteFile
urlmon
URLDownloadToFileW
crypt32
CryptUnprotectData
Sections
.text Size: 210KB - Virtual size: 209KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ