Static task
static1
Behavioral task
behavioral1
Sample
ffe8ce467ea5506baf48fc6930929e5c0f0d3ec2133fefa25a97a75237a86877.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
ffe8ce467ea5506baf48fc6930929e5c0f0d3ec2133fefa25a97a75237a86877.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_66d17caca4ec6104ee32c7dcaaf8fd532365fd1bd72b295f5ad8e906ce5d65f8
-
Size
4.3MB
-
MD5
f37914a21acdae14ad060a342c7cc69f
-
SHA1
7e52b5b04249a123805e689ed251feaa11d977cb
-
SHA256
66d17caca4ec6104ee32c7dcaaf8fd532365fd1bd72b295f5ad8e906ce5d65f8
-
SHA512
3f1796d4284742bc4988f0ae226f1930cf0228d77085e547c9fa67e61bd707e0fbde7feebd332ee2ca8ce4eb2480efcdf15c57a248a1cf8b3aad4d456f68f6f7
-
SSDEEP
98304:a+k2W76CRoawpsZS35vfObwMO7rNJrtOjMPOS:a+kF76JaksZmVObEHN/OjMPf
Malware Config
Signatures
Files
-
JaffaCakes118_66d17caca4ec6104ee32c7dcaaf8fd532365fd1bd72b295f5ad8e906ce5d65f8.zip
Password: infected
-
ffe8ce467ea5506baf48fc6930929e5c0f0d3ec2133fefa25a97a75237a86877.exe windows:5 windows x86 arch:x86
136b2a08509d43e19ab48f1d5496644a
Code Sign
ee:d3:04:a1:b8:81:01:5d:ce:9f:d1:1a:75:7d:93:c2Certificate
IssuerPOSTALCODE=10051Not Before17-06-2021 03:33Not After17-06-2022 03:33SubjectPOSTALCODE=10051c5:f3:ff:4e:71:5c:24:2c:84:27:0b:8b:3c:83:60:87:26:cd:85:53:67:6b:81:c5:fe:5d:fc:19:c1:f6:7d:27Signer
Actual PE Digestc5:f3:ff:4e:71:5c:24:2c:84:27:0b:8b:3c:83:60:87:26:cd:85:53:67:6b:81:c5:fe:5d:fc:19:c1:f6:7d:27Digest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
C:\rupeva\dofowipig\fumow88\lowadef44\lowav\rumozi_gorixubeg.pdb
Imports
kernel32
GetFileSize
SetLocalTime
GetDriveTypeW
SetEndOfFile
GetNumberOfConsoleInputEvents
FindResourceExW
MapUserPhysicalPages
InterlockedIncrement
GetCommState
InterlockedDecrement
ScrollConsoleScreenBufferW
WriteConsoleInputA
SetComputerNameW
GetComputerNameW
CallNamedPipeW
GetModuleHandleW
GetSystemWow64DirectoryA
CreateDirectoryExW
TlsSetValue
GlobalAlloc
GetVolumeInformationA
Sleep
ReadFileScatter
GetSystemTimeAdjustment
InterlockedPopEntrySList
GlobalFlags
Beep
VerifyVersionInfoA
IsDBCSLeadByte
ReadFile
CreateFileW
GetBinaryTypeW
CompareStringW
GetACP
lstrlenW
GetConsoleOutputCP
CreateDirectoryA
GetStdHandle
FindFirstFileA
OpenMutexW
GlobalFix
SetVolumeLabelW
WriteProfileSectionA
ReadFileEx
CreateMemoryResourceNotification
SearchPathA
GetPrivateProfileStringA
SetFileApisToOEM
GetAtomNameA
Process32FirstW
OpenWaitableTimerW
IsSystemResumeAutomatic
GetCommMask
AddAtomA
GetSystemInfo
SetSystemTime
EnumResourceTypesW
SetConsoleCursorInfo
CreateIoCompletionPort
SetConsoleTitleW
GetModuleHandleA
FreeEnvironmentStringsW
EnumResourceNamesA
GetConsoleTitleW
BuildCommDCBA
GetCurrentDirectoryA
CompareStringA
SetCalendarInfoA
GetVersionExA
GetWindowsDirectoryW
GetCurrentProcessId
GetProfileSectionW
SuspendThread
LCMapStringW
CopyFileExA
DeleteFileA
GetProcAddress
GetCommandLineW
GetLastError
GetStartupInfoW
HeapValidate
IsBadReadPtr
RaiseException
LeaveCriticalSection
EnterCriticalSection
SetStdHandle
GetFileType
WriteFile
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetModuleFileNameW
DeleteCriticalSection
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetSystemTimeAsFileTime
ExitProcess
GetEnvironmentStringsW
SetHandleCount
GetStartupInfoA
TlsGetValue
TlsAlloc
TlsFree
SetLastError
HeapDestroy
HeapCreate
HeapFree
VirtualFree
GetModuleFileNameA
HeapAlloc
HeapSize
HeapReAlloc
VirtualAlloc
GetOEMCP
GetCPInfo
IsValidCodePage
InitializeCriticalSectionAndSpinCount
WriteConsoleA
WriteConsoleW
MultiByteToWideChar
SetFilePointer
RtlUnwind
DebugBreak
OutputDebugStringA
OutputDebugStringW
LoadLibraryW
LoadLibraryA
LCMapStringA
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
CreateFileA
CloseHandle
FlushFileBuffers
user32
GetListBoxInfo
GetComboBoxInfo
GetMenuBarInfo
advapi32
InitiateSystemShutdownW
Exports
Exports
_futurama@4
_hiduk@8
_regulmoto@4
Sections
.text Size: 4.4MB - Virtual size: 4.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 48KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 4.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 10KB - Virtual size: 153KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 37KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ