Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_465f3e71e8c21f670c83a6dc4a39961162acb7d5e30841f9fbf459106fa7c517.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
JaffaCakes118_465f3e71e8c21f670c83a6dc4a39961162acb7d5e30841f9fbf459106fa7c517.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_465f3e71e8c21f670c83a6dc4a39961162acb7d5e30841f9fbf459106fa7c517
-
Size
4.0MB
-
MD5
eaf9f17dae09332eadd5ef2395e942ae
-
SHA1
b57eb0e2cb5502dc57e58ce760e45c68fb154133
-
SHA256
465f3e71e8c21f670c83a6dc4a39961162acb7d5e30841f9fbf459106fa7c517
-
SHA512
4a78dcd6c3092d9dbc898fd1a5640c3db7eba04aab95768391b83436787387cd2e548ce2e45295f400a582ea898905a392c9ee09b09e1c677ed4fc598e20f822
-
SSDEEP
49152:73j4uqaqoh4Tmh21Z8uKZQile513bnWeBL1Gt2TL1F22/kl1ko5pABSr/oVZ5cog:7UjbK4TC2RPzzWeBLxLD2/WSSzB5o
Malware Config
Signatures
Files
-
JaffaCakes118_465f3e71e8c21f670c83a6dc4a39961162acb7d5e30841f9fbf459106fa7c517.exe windows:5 windows x86 arch:x86
d03478a6c3c407f77f1436449d58c5a8
Code Sign
e9:65:ef:50:86:7d:90:73:9f:2a:27:79:c1:5e:1b:32Certificate
IssuerPOSTALCODE=10305Not Before23-10-2022 16:26Not After23-10-2023 16:26SubjectPOSTALCODE=1030534:81:05:c1:b4:e3:e6:05:c4:29:4f:7f:03:7c:ef:84:e6:da:69:5e:16:12:e3:d1:88:e6:29:48:a9:ae:ab:fdSigner
Actual PE Digest34:81:05:c1:b4:e3:e6:05:c4:29:4f:7f:03:7c:ef:84:e6:da:69:5e:16:12:e3:d1:88:e6:29:48:a9:ae:ab:fdDigest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
C:\nuxabiy mana 75\zihunepu\18\putomupacagor1\yudutugumam\mawemu.pdb
Imports
kernel32
GetConsoleAliasesLengthW
GetConsoleAliasExesA
LoadResource
VerSetConditionMask
InterlockedDecrement
WaitNamedPipeA
SetFirmwareEnvironmentVariableA
GetSystemDefaultLCID
GetGeoInfoW
GlobalAlloc
SetFileShortNameW
GetConsoleAliasW
GetFileAttributesW
WriteConsoleW
lstrlenW
RaiseException
LCMapStringA
OpenMutexW
SetLastError
GetProcAddress
FindVolumeMountPointClose
VirtualAlloc
IsValidCodePage
SetComputerNameA
LoadLibraryA
LocalAlloc
AddAtomA
FoldStringA
GetModuleHandleA
CreateMutexA
FreeEnvironmentStringsW
FindNextFileW
GetFileAttributesExW
TerminateJobObject
LCMapStringW
GetStartupInfoW
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
GetLastError
SetFilePointer
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EnterCriticalSection
LeaveCriticalSection
HeapFree
CloseHandle
GetModuleHandleW
Sleep
ExitProcess
WriteFile
GetModuleFileNameA
GetModuleFileNameW
GetEnvironmentStringsW
GetCommandLineW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
GetCurrentThreadId
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
InitializeCriticalSectionAndSpinCount
SetStdHandle
RtlUnwind
GetCPInfo
GetACP
GetOEMCP
HeapAlloc
HeapReAlloc
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
FlushFileBuffers
MultiByteToWideChar
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
WriteConsoleA
GetConsoleOutputCP
HeapSize
CreateFileA
Sections
.text Size: 67KB - Virtual size: 66KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 3.9MB - Virtual size: 43.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 23KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 25KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ