Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_0583132e733a7d3df6bc4805b216376a88f3606f3c38fece7df003d2d7ad5620.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_0583132e733a7d3df6bc4805b216376a88f3606f3c38fece7df003d2d7ad5620.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_0583132e733a7d3df6bc4805b216376a88f3606f3c38fece7df003d2d7ad5620
-
Size
4.1MB
-
MD5
d0bbaf8a189d4a3a682253b97b4a66b9
-
SHA1
54a63688b4fe68910658f43ebd60321a4a50f9c2
-
SHA256
0583132e733a7d3df6bc4805b216376a88f3606f3c38fece7df003d2d7ad5620
-
SHA512
581204b41cab6035740f2f28782d90fe591a831e0abea1ba362c5acb9ad4659d4a5f178a6d67386ec2104b29736b4087c0fb50b6b2b275ada96a6c498b45da49
-
SSDEEP
98304:blbUq5qpQglywK11kwbtMH11zTw/dv16H5TuCkJxIr0rIVwp8rcq+pAvQbh:hg5pjWgmGVoCkwQIVypV
Malware Config
Signatures
Files
-
JaffaCakes118_0583132e733a7d3df6bc4805b216376a88f3606f3c38fece7df003d2d7ad5620.exe windows:5 windows x86 arch:x86
bc57832ec1fddf960b28fd6e06cc17ba
Code Sign
65:18:80:77:53:c2:71:e3:55:05:ae:b0:ec:45:47:d0Certificate
IssuerPOSTALCODE=10305Not Before14-10-2022 23:21Not After14-10-2023 23:21SubjectPOSTALCODE=10305bc:b8:c7:bf:86:a8:38:f2:d3:99:cf:6a:36:9c:31:64:65:75:91:59:6d:91:1b:b1:ec:96:74:6c:4d:11:96:56Signer
Actual PE Digestbc:b8:c7:bf:86:a8:38:f2:d3:99:cf:6a:36:9c:31:64:65:75:91:59:6d:91:1b:b1:ec:96:74:6c:4d:11:96:56Digest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
C:\tecalileladuy\fomovima_100\tohigekiy-napeboh47_kuwe_fuyewice.pdb
Imports
kernel32
TlsGetValue
SetEndOfFile
InterlockedIncrement
GetConsoleAliasA
SetComputerNameW
MoveFileWithProgressA
IsBadReadPtr
WaitNamedPipeW
SetCommTimeouts
EnumResourceTypesA
SetFileShortNameW
LoadLibraryW
CreateEventA
SetVolumeMountPointA
GetFileAttributesA
DnsHostnameToComputerNameW
GetFileAttributesW
SetTimeZoneInformation
GetGeoInfoA
GetBinaryTypeW
IsBadStringPtrA
LCMapStringA
CreateMutexW
GetLastError
GetProcAddress
VirtualAlloc
HeapSize
GlobalGetAtomNameA
SetFileAttributesA
LoadLibraryA
WriteConsoleA
LocalAlloc
AddAtomW
FoldStringA
FindNextFileA
GetModuleHandleA
VirtualProtect
GetFileAttributesExW
ReadConsoleInputW
GetVersion
SetFileValidData
GetSystemDefaultLangID
GetCommandLineA
GetStartupInfoA
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetModuleHandleW
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
InterlockedDecrement
Sleep
ExitProcess
EnterCriticalSection
LeaveCriticalSection
RtlUnwind
HeapFree
SetHandleCount
GetStdHandle
GetFileType
DeleteCriticalSection
SetFilePointer
WriteFile
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetConsoleCP
GetConsoleMode
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
HeapAlloc
HeapReAlloc
InitializeCriticalSectionAndSpinCount
ReadFile
CloseHandle
CreateFileA
RaiseException
SetStdHandle
FlushFileBuffers
GetConsoleOutputCP
WriteConsoleW
MultiByteToWideChar
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
GetProcessHeap
advapi32
DeregisterEventSource
ole32
OleQueryLinkFromData
Sections
.text Size: 91KB - Virtual size: 91KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 3.9MB - Virtual size: 3.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 50KB - Virtual size: 4.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ