Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_39b87a3d552d60768cbfe6aaa745a0e6926f5df8e54a472ded2f049db9c87685.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_39b87a3d552d60768cbfe6aaa745a0e6926f5df8e54a472ded2f049db9c87685.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_39b87a3d552d60768cbfe6aaa745a0e6926f5df8e54a472ded2f049db9c87685
-
Size
4.3MB
-
MD5
96268a47cc0a899f2b501198fa007136
-
SHA1
81a1ade68e2c16eb3c95f342a08dc263b67e226f
-
SHA256
39b87a3d552d60768cbfe6aaa745a0e6926f5df8e54a472ded2f049db9c87685
-
SHA512
fcbac79e8df15a0ce627be8df4bc8873d936020bfe1f81fdbb3dfb0cc127e0bb3898220aaf48ab3c34b69a5d557e8907098ac88cb3f44cde41c514c3c5480e48
-
SSDEEP
98304:lEE8o+YIHHUVHEElgbCrTKQvvWbL6rGS37:mEJhInds4tbL6rpr
Malware Config
Signatures
Files
-
JaffaCakes118_39b87a3d552d60768cbfe6aaa745a0e6926f5df8e54a472ded2f049db9c87685.exe windows:5 windows x86 arch:x86
e4cc0552ff5e56edf2c3c2af90f2cbe3
Code Sign
7d:4e:de:c9:86:6f:7d:17:cc:f2:18:d6:71:f9:43:fcCertificate
IssuerPOSTALCODE=10305Not Before21-11-2021 18:48Not After21-11-2022 18:48SubjectPOSTALCODE=10305ba:29:50:44:96:6b:1f:42:66:a7:77:8c:d1:cb:b7:da:1e:10:c5:34:e2:da:f6:14:1f:39:75:5a:7d:92:25:03Signer
Actual PE Digestba:29:50:44:96:6b:1f:42:66:a7:77:8c:d1:cb:b7:da:1e:10:c5:34:e2:da:f6:14:1f:39:75:5a:7d:92:25:03Digest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
C:\balufehawenuz mehejaju zaf_3_bozadobiras95\luronabafi.pdb
Imports
kernel32
GetFullPathNameA
GetThreadContext
GetPrivateProfileSectionNamesW
EnumResourceNamesW
UnregisterWait
GetNumaNodeProcessorMask
SetCriticalSectionSpinCount
GetCommModemStatus
GlobalMemoryStatus
SearchPathW
SetInformationJobObject
lstrcmpA
FindFirstFileW
SetThreadContext
FindFirstChangeNotificationW
EnumCalendarInfoA
WriteConsoleInputW
IsBadStringPtrW
lstrlenA
GetConsoleAliasesLengthW
EnumDateFormatsExW
CopyFileExW
TlsGetValue
SetLocalTime
UnmapViewOfFile
MoveFileExA
GetNumberOfConsoleInputEvents
GetConsoleAliasExesLengthA
WriteConsoleOutputCharacterA
SetErrorMode
FindResourceW
FreeLibrary
DeleteVolumeMountPointA
SetUnhandledExceptionFilter
LoadLibraryExW
SetDllDirectoryW
InterlockedIncrement
GetQueuedCompletionStatus
VerSetConditionMask
MoveFileExW
InterlockedDecrement
WaitNamedPipeA
SetMailslotInfo
ZombifyActCtx
SetConsoleActiveScreenBuffer
WritePrivateProfileSectionA
SetDefaultCommConfigW
SetFirmwareEnvironmentVariableA
SetEnvironmentVariableW
GetNamedPipeHandleStateA
SignalObjectAndWait
AddConsoleAliasW
SetVolumeMountPointW
GetComputerNameW
SetEvent
SetThreadExecutionState
OpenSemaphoreA
GetFileAttributesExA
_lclose
OutputDebugStringW
GetTickCount
GetCommConfig
GetProcessHeap
IsBadReadPtr
GetConsoleAliasesLengthA
GetSystemTimeAsFileTime
GetPrivateProfileStringW
GetConsoleTitleA
ReadConsoleW
CreateRemoteThread
GetCompressedFileSizeW
EnumTimeFormatsA
SetCommTimeouts
CreateActCtxW
InitializeCriticalSection
GetProcessTimes
TlsSetValue
AllocateUserPhysicalPages
OpenProcess
FindResourceExA
GetConsoleCP
GetPrivateProfileIntA
LoadLibraryW
GetConsoleMode
TerminateThread
FatalAppExitW
ReadConsoleInputA
GetThreadSelectorEntry
CopyFileW
AssignProcessToJobObject
GetPrivateProfileStructW
GetCalendarInfoA
ReadFileScatter
SetSystemTimeAdjustment
ReadConsoleOutputW
MapUserPhysicalPagesScatter
SetConsoleCP
InterlockedPopEntrySList
LeaveCriticalSection
GlobalFlags
lstrcpynW
GetNamedPipeInfo
HeapValidate
GetVolumePathNamesForVolumeNameW
CreateSemaphoreA
SetConsoleCursorPosition
GetFileAttributesW
HeapQueryInformation
GetBinaryTypeA
WritePrivateProfileSectionW
GetComputerNameA
GetAtomNameW
FileTimeToSystemTime
GetModuleFileNameW
lstrcatA
GetBinaryTypeW
CompareStringW
ExitThread
GetVolumePathNameA
SetConsoleTitleA
GlobalUnlock
VirtualUnlock
GetTempPathW
RaiseException
GetStringTypeExA
CreateJobObjectA
GetPrivateProfileIntW
VerifyVersionInfoW
InterlockedExchange
SetCurrentDirectoryA
GetStdHandle
FindFirstFileA
GetLastError
ChangeTimerQueueTimer
BindIoCompletionCallback
GetProcAddress
FindVolumeMountPointClose
GetLongPathNameA
VirtualAlloc
HeapSize
BackupWrite
VerLanguageNameA
CreateNamedPipeA
EnumDateFormatsExA
CreateJobSet
LocalLock
MoveFileW
LockFileEx
SearchPathA
DefineDosDeviceA
GetNumaHighestNodeNumber
FindClose
GetPrivateProfileStringA
LoadLibraryA
Process32FirstW
OpenMutexA
ProcessIdToSessionId
LocalAlloc
GetFileType
WritePrivateProfileStringA
BuildCommDCBAndTimeoutsW
CreateHardLinkW
GetExitCodeThread
GetNumberFormatW
SetFileApisToANSI
QueryDosDeviceW
SetConsoleWindowInfo
SetThreadIdealProcessor
HeapWalk
GetPrivateProfileStructA
GetTapeParameters
GetVolumePathNamesForVolumeNameA
GetModuleFileNameA
GetDefaultCommConfigA
FindNextFileA
WriteProfileStringA
EnumDateFormatsA
WaitCommEvent
_lread
GetModuleHandleA
GetProcessShutdownParameters
QueueUserWorkItem
ContinueDebugEvent
IsDebuggerPresent
GetProcessAffinityMask
FreeEnvironmentStringsW
EnumResourceNamesA
WriteProfileStringW
BuildCommDCBA
EnumDateFormatsW
GetConsoleCursorInfo
FatalAppExitA
PeekConsoleInputA
DeleteCriticalSection
WriteConsoleOutputAttribute
OutputDebugStringA
GetCPInfoExA
DuplicateHandle
FindFirstVolumeA
GetVersionExA
TlsAlloc
TerminateJobObject
CloseHandle
FileTimeToLocalFileTime
GetVersion
QueryDepthSList
DeleteTimerQueueTimer
GlobalAddAtomW
SetFileValidData
FindActCtxSectionStringW
ResetWriteWatch
UnregisterWaitEx
ReadConsoleOutputCharacterW
TlsFree
GetProfileSectionW
EnumSystemLocalesW
lstrcpyW
CommConfigDialogW
DeleteFileA
TerminateProcess
ExitProcess
FlushFileBuffers
CreateFileW
LCMapStringW
EncodePointer
DecodePointer
GetCommandLineW
HeapSetInformation
GetStartupInfoW
GetCurrentProcess
UnhandledExceptionFilter
IsProcessorFeaturePresent
GetModuleHandleW
QueryPerformanceCounter
GetCurrentThreadId
GetCurrentProcessId
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
SetLastError
HeapCreate
WriteFile
SetFilePointer
WideCharToMultiByte
EnterCriticalSection
GetACP
GetOEMCP
GetCPInfo
IsValidCodePage
WriteConsoleW
HeapAlloc
HeapReAlloc
HeapFree
RtlUnwind
SetStdHandle
MultiByteToWideChar
GetStringTypeW
user32
GetMessageTime
gdi32
GetBitmapBits
winhttp
WinHttpReadData
msimg32
GradientFill
Sections
.text Size: 4.2MB - Virtual size: 4.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 39.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 76KB - Virtual size: 75KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ