Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_152d7c4b438f91e4c4ef5621bbd804641db97f948279f33bfec10cd06742f500.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
JaffaCakes118_152d7c4b438f91e4c4ef5621bbd804641db97f948279f33bfec10cd06742f500.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_152d7c4b438f91e4c4ef5621bbd804641db97f948279f33bfec10cd06742f500
-
Size
4.1MB
-
MD5
238a0b45c289778749e34153a7327908
-
SHA1
fbe8fb9436ca409fc9ec73b6fa2fc1e2cf7004f6
-
SHA256
152d7c4b438f91e4c4ef5621bbd804641db97f948279f33bfec10cd06742f500
-
SHA512
3cbfacfe80aa97120a4c2b525f3e21a9ad37055d0aa941c27b8095775363ef249c5016227dc3f795db5bb60181574e76eb4c76541429bf70ee97a0497945118a
-
SSDEEP
98304:sjOY34AgHqfLI3rtHlSOtrVrbsjtUnGSlSdN:u343HeUtHlDTr4BR
Malware Config
Signatures
Files
-
JaffaCakes118_152d7c4b438f91e4c4ef5621bbd804641db97f948279f33bfec10cd06742f500.exe windows:5 windows x86 arch:x86
b62bd316acc88af39325b14542024bbc
Code Sign
80:73:76:3d:38:d8:ae:3e:e8:1b:da:74:9c:81:b4:50Certificate
IssuerPOSTALCODE=10305Not Before26-10-2022 04:20Not After26-10-2023 04:20SubjectPOSTALCODE=103057f:7a:56:e0:a0:4d:dc:40:e5:e0:07:45:27:26:ea:dc:c9:58:25:76:5e:57:e6:ec:7f:01:6d:a6:12:6c:95:ffSigner
Actual PE Digest7f:7a:56:e0:a0:4d:dc:40:e5:e0:07:45:27:26:ea:dc:c9:58:25:76:5e:57:e6:ec:7f:01:6d:a6:12:6c:95:ffDigest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
C:\derenekereceja\riwi.pdb
Imports
kernel32
GetVolumeInformationW
GetComputerNameA
LocalSize
InterlockedDecrement
SetSystemTimeAdjustment
FindNextVolumeA
GetConsoleAliasExesLengthW
EnumSystemCodePagesW
TlsGetValue
CopyFileExA
MoveFileWithProgressW
VerifyVersionInfoW
LocalUnlock
DebugBreak
GlobalGetAtomNameA
MapViewOfFileEx
GetWindowsDirectoryW
GetModuleHandleA
lstrlenW
FindResourceW
GetComputerNameExA
GetProcAddress
GlobalAlloc
WriteConsoleW
GetFileTime
GetConsoleAliasesLengthA
GetOEMCP
GetProcessAffinityMask
GlobalFindAtomA
VerifyVersionInfoA
CreateActCtxW
GetModuleHandleW
FindNextVolumeW
InitializeCriticalSection
CancelDeviceWakeupRequest
GetConsoleSelectionInfo
InterlockedExchange
EnterCriticalSection
InterlockedCompareExchange
EnumCalendarInfoA
GetPrivateProfileStructW
GetNamedPipeHandleStateA
AreFileApisANSI
LoadLibraryW
GetTickCount
SetLastError
FoldStringW
LoadLibraryA
WideCharToMultiByte
InterlockedIncrement
MultiByteToWideChar
Sleep
DeleteCriticalSection
LeaveCriticalSection
RtlUnwind
RaiseException
GetLastError
HeapFree
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
ExitProcess
GetStartupInfoW
LCMapStringA
LCMapStringW
GetCPInfo
HeapAlloc
TlsAlloc
TlsSetValue
TlsFree
GetCurrentThreadId
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
WriteFile
GetStdHandle
GetModuleFileNameA
InitializeCriticalSectionAndSpinCount
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetACP
IsValidCodePage
GetLocaleInfoA
GetStringTypeA
GetStringTypeW
HeapSize
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
SetFilePointer
GetConsoleCP
GetConsoleMode
GetLocaleInfoW
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
FlushFileBuffers
CreateFileA
CloseHandle
gdi32
GetCharWidthA
Sections
.text Size: 131KB - Virtual size: 131KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 3.9MB - Virtual size: 5.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 18KB - Virtual size: 3.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ