Static task
static1
Behavioral task
behavioral1
Sample
3e057f415ed8790ef3da1f03975f141007b86fe87fe5d6664909a2a5727e6182.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
3e057f415ed8790ef3da1f03975f141007b86fe87fe5d6664909a2a5727e6182.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_0206f860d13c109abb83b9a38512fcf3b77072effe5ec7e6ae56c16f0c536f8f
-
Size
4.3MB
-
MD5
08b2661cb50018ff50f94bf8adf475fa
-
SHA1
a2de36ec5849810cec6f66f2360c7c50d4a6bb3c
-
SHA256
0206f860d13c109abb83b9a38512fcf3b77072effe5ec7e6ae56c16f0c536f8f
-
SHA512
a404191a969dcbcd49e9d38c9d878deb049cad4927c6319cac3762ad175b4e3ceaf227041b911e5b96cc17427588bc81be4c10027a424f8928436ebe340ebaaa
-
SSDEEP
98304:Vv9yg7rjPRKnGk1C5Yt1cbv1ojOr2peiqAYyzKZIXcn2J:VvX7rjPRgGRYnqmgKqnJaXc2J
Malware Config
Signatures
Files
-
JaffaCakes118_0206f860d13c109abb83b9a38512fcf3b77072effe5ec7e6ae56c16f0c536f8f.zip
Password: infected
-
3e057f415ed8790ef3da1f03975f141007b86fe87fe5d6664909a2a5727e6182.exe windows:5 windows x86 arch:x86
9b6cb8fb7864152f2c65c8441d386700
Code Sign
68:0c:05:43:a6:24:e7:b6:61:81:1d:96:37:f6:ff:cfCertificate
IssuerPOSTALCODE=10062Not Before16-06-2021 11:37Not After16-06-2022 11:37SubjectPOSTALCODE=10062b0:c3:69:a7:57:e6:ee:f0:34:84:3b:04:25:f3:c0:f6:88:b4:72:3b:91:89:34:62:0d:74:b2:02:8d:16:dd:a2Signer
Actual PE Digestb0:c3:69:a7:57:e6:ee:f0:34:84:3b:04:25:f3:c0:f6:88:b4:72:3b:91:89:34:62:0d:74:b2:02:8d:16:dd:a2Digest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
C:\nikediy\hiyefuf\nawavuru.pdb
Imports
kernel32
WriteConsoleInputW
CopyFileExW
TlsGetValue
SetLocalTime
GetDriveTypeW
SetEndOfFile
GetNumberOfConsoleInputEvents
FindResourceExW
MapUserPhysicalPages
InterlockedIncrement
GetQueuedCompletionStatus
GetCommState
InterlockedDecrement
ScrollConsoleScreenBufferW
CallNamedPipeW
GetModuleHandleW
WriteFileGather
CreateDirectoryExW
Sleep
GetSystemTimeAdjustment
GlobalFlags
Beep
VerifyVersionInfoA
IsDBCSLeadByte
ReadFile
CreateFileW
GetBinaryTypeW
GetACP
lstrlenW
VerifyVersionInfoW
CreateDirectoryA
GetStdHandle
OpenMutexW
GetCurrentDirectoryW
GetProcAddress
SetVolumeLabelW
WriteProfileSectionA
FindFirstFileW
SetComputerNameA
CreateMemoryResourceNotification
SearchPathA
GetPrivateProfileStringA
SetFileApisToOEM
GetAtomNameA
Process32FirstW
OpenWaitableTimerW
LocalAlloc
IsSystemResumeAutomatic
SetConsoleOutputCP
AddAtomW
SetCommMask
GetPrivateProfileStructA
EnumResourceTypesW
SetConsoleTitleW
GetModuleHandleA
FreeEnvironmentStringsW
EnumResourceNamesA
GetConsoleTitleW
BuildCommDCBA
CompareStringA
GetConsoleCursorInfo
SetCalendarInfoA
GetVersionExA
GetWindowsDirectoryW
GetCurrentProcessId
InterlockedPushEntrySList
GetProfileSectionW
SuspendThread
LCMapStringW
GetVolumeInformationW
SetFilePointer
SetStdHandle
CloseHandle
RaiseException
ReadFileEx
GetFileSize
GetCommandLineW
HeapSetInformation
GetStartupInfoW
EnterCriticalSection
LeaveCriticalSection
DecodePointer
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EncodePointer
GetModuleFileNameW
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetSystemTimeAsFileTime
ExitProcess
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
HeapValidate
IsBadReadPtr
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetLastError
HeapCreate
WriteFile
RtlUnwind
GetOEMCP
GetCPInfo
IsValidCodePage
OutputDebugStringA
WriteConsoleW
OutputDebugStringW
LoadLibraryW
MultiByteToWideChar
HeapAlloc
GetModuleFileNameA
HeapReAlloc
HeapSize
HeapQueryInformation
HeapFree
GetStringTypeW
WideCharToMultiByte
FlushFileBuffers
GetConsoleCP
GetConsoleMode
IsProcessorFeaturePresent
user32
GetMenuBarInfo
GetComboBoxInfo
GetMessageTime
advapi32
InitiateSystemShutdownA
Exports
Exports
_CallPattern@8
_futurama@4
_hiduk@8
_zabiray@8
Sections
.text Size: 4.4MB - Virtual size: 4.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 41KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 45.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 75KB - Virtual size: 74KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ