Static task
static1
Behavioral task
behavioral1
Sample
83c43f97e3004978fdf9f8b74c914ef8569fcef4bce255021c05b71a7ed0828e.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
83c43f97e3004978fdf9f8b74c914ef8569fcef4bce255021c05b71a7ed0828e.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_f1d59be279a16325b26b43792745f2a9a5fc77541caadd0ffe8f93fab25c4d1b
-
Size
4.3MB
-
MD5
f1a839f3c054ef168f857030f6f366a6
-
SHA1
56bb68da3dcb905d7c583bcda3c4c23ac5dd3d6c
-
SHA256
f1d59be279a16325b26b43792745f2a9a5fc77541caadd0ffe8f93fab25c4d1b
-
SHA512
0bd2a8e59f2e3323535f68d98ccda670b1815c79f911ace1d8df133e597b616a93b0471e79a7302a88b2ca07b9e582c5e08a83b2f1580cb188d97378a709c010
-
SSDEEP
98304:etJnfkfy0nYr0QJbVFBuBap6k2s4tfxx0iguwm6fpl0fNQE:eXfkf2r0cEBaux0aw50f
Malware Config
Signatures
Files
-
JaffaCakes118_f1d59be279a16325b26b43792745f2a9a5fc77541caadd0ffe8f93fab25c4d1b.zip
Password: infected
-
83c43f97e3004978fdf9f8b74c914ef8569fcef4bce255021c05b71a7ed0828e.exe windows:5 windows x86 arch:x86
f15a946d6e0659432dc9b8c464554438
Code Sign
ce:df:76:e1:0e:d8:78:c6:5d:ba:ad:ff:3e:0c:6a:05Certificate
IssuerPOSTALCODE=10051Not Before16-06-2021 12:13Not After16-06-2022 12:13SubjectPOSTALCODE=1005121:46:48:48:c4:33:d8:73:a1:f2:b6:c7:84:e8:dd:80:ad:d9:9d:5c:44:29:d4:21:47:42:fe:40:f8:66:43:4bSigner
Actual PE Digest21:46:48:48:c4:33:d8:73:a1:f2:b6:c7:84:e8:dd:80:ad:d9:9d:5c:44:29:d4:21:47:42:fe:40:f8:66:43:4bDigest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
C:\lokoruxen.pdb
Imports
kernel32
CopyFileExW
TlsGetValue
SetLocalTime
GetDriveTypeW
SetEndOfFile
GetNumberOfConsoleInputEvents
FindResourceExW
MapUserPhysicalPages
CallNamedPipeA
InterlockedIncrement
GetQueuedCompletionStatus
GetCommState
InterlockedDecrement
ScrollConsoleScreenBufferW
GetModuleHandleW
WriteFileGather
CreateDirectoryExW
Sleep
GetSystemTimeAdjustment
GlobalFlags
Beep
VerifyVersionInfoA
IsDBCSLeadByte
ReadFile
CreateFileW
GetBinaryTypeW
GetACP
lstrlenW
VerifyVersionInfoW
CreateDirectoryA
GetStdHandle
FindFirstFileA
OpenMutexW
GetCurrentDirectoryW
GetProcAddress
SetVolumeLabelW
WriteProfileSectionA
WriteConsoleInputW
SetComputerNameA
CreateMemoryResourceNotification
SearchPathA
GetPrivateProfileStringA
SetFileApisToOEM
GetAtomNameA
Process32FirstW
OpenWaitableTimerW
LocalAlloc
IsSystemResumeAutomatic
SetConsoleOutputCP
AddAtomW
SetCommMask
GetPrivateProfileStructA
EnumResourceTypesW
SetConsoleTitleW
GetModuleHandleA
FreeEnvironmentStringsW
EnumResourceNamesA
GetConsoleTitleW
BuildCommDCBA
CompareStringA
GetConsoleCursorInfo
SetCalendarInfoA
GetVersionExA
GetWindowsDirectoryW
GetCurrentProcessId
InterlockedPushEntrySList
GetProfileSectionW
SuspendThread
LCMapStringW
GetVolumeInformationW
SetFilePointer
SetStdHandle
CloseHandle
RaiseException
ReadFileEx
GetFileSize
GetCommandLineW
HeapSetInformation
GetStartupInfoW
EnterCriticalSection
LeaveCriticalSection
DecodePointer
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EncodePointer
GetModuleFileNameW
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetSystemTimeAsFileTime
ExitProcess
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
HeapValidate
IsBadReadPtr
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetLastError
HeapCreate
WriteFile
RtlUnwind
GetOEMCP
GetCPInfo
IsValidCodePage
OutputDebugStringA
WriteConsoleW
OutputDebugStringW
LoadLibraryW
MultiByteToWideChar
HeapAlloc
GetModuleFileNameA
HeapReAlloc
HeapSize
HeapQueryInformation
HeapFree
GetStringTypeW
WideCharToMultiByte
FlushFileBuffers
GetConsoleCP
GetConsoleMode
IsProcessorFeaturePresent
user32
GetMenuBarInfo
GetComboBoxInfo
GetMessageTime
advapi32
InitiateSystemShutdownW
Exports
Exports
_CallPattern@8
_futurama@4
_hiduk@8
_zabiray@8
Sections
.text Size: 4.4MB - Virtual size: 4.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 47KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 45.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 75KB - Virtual size: 75KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ