Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_6d7e8b7daafb758576f50e8b64d9f9397d28145ea3a8e6bfcab5d3d0492c54fa.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
JaffaCakes118_6d7e8b7daafb758576f50e8b64d9f9397d28145ea3a8e6bfcab5d3d0492c54fa.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_6d7e8b7daafb758576f50e8b64d9f9397d28145ea3a8e6bfcab5d3d0492c54fa
-
Size
4.1MB
-
MD5
e6418e028536c25bb754d7be43136143
-
SHA1
d8b410dec47d06e812c363af632cc80890335634
-
SHA256
6d7e8b7daafb758576f50e8b64d9f9397d28145ea3a8e6bfcab5d3d0492c54fa
-
SHA512
8e6a2e2643c32ac0f4241a9fbe73abca39dc663cd2a8d4a4f3a776ca10d92330b7aab7e10a90a21b552a67c58105c17ab75a485a2250e6eb5b3cc3a9a2651079
-
SSDEEP
98304:gY0EOkRt7D7mAwSGvS5gZaiUSIgvKy4Wpv+gdYiGll/PTpGaXg:5hjj7DeSGZZaDS4UWgd0ll/7pGb
Malware Config
Signatures
Files
-
JaffaCakes118_6d7e8b7daafb758576f50e8b64d9f9397d28145ea3a8e6bfcab5d3d0492c54fa.exe windows:5 windows x86 arch:x86
11341dd96bb97e71cefcf69a59fb99c5
Code Sign
a5:d1:3b:fd:c6:42:45:e3:3e:4b:56:c9:83:d0:cf:d9Certificate
IssuerPOSTALCODE=10305Not Before18-10-2022 14:27Not After18-10-2023 14:27SubjectPOSTALCODE=103056b:41:2c:f9:85:b8:c0:c0:66:df:a9:ff:0a:ee:b7:13:5d:48:73:1b:c2:03:d6:25:54:da:47:02:87:e7:79:f3Signer
Actual PE Digest6b:41:2c:f9:85:b8:c0:c0:66:df:a9:ff:0a:ee:b7:13:5d:48:73:1b:c2:03:d6:25:54:da:47:02:87:e7:79:f3Digest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
C:\leviyafibapiri_yub\posasug_hitive.pdb
Imports
kernel32
GetSystemDefaultLangID
CreateMutexW
GetConsoleAliasesLengthW
VerSetConditionMask
GetConsoleAliasA
InterlockedDecrement
GetFileAttributesExA
WaitNamedPipeW
SetCommTimeouts
EnumResourceTypesA
LoadLibraryW
Sleep
GetFileAttributesA
DnsHostnameToComputerNameW
GetConsoleAliasW
WriteConsoleW
IsBadWritePtr
GetGeoInfoA
GetCompressedFileSizeA
RaiseException
GetLastError
GetProcAddress
VirtualAlloc
HeapSize
SetComputerNameA
LoadLibraryA
WriteConsoleA
LocalAlloc
CreateEventW
AddAtomA
FoldStringA
FindNextFileA
GetModuleHandleA
SetFileShortNameA
ReadConsoleInputW
LCMapStringW
LocalFileTimeToFileTime
GetStartupInfoW
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
SetFilePointer
EnterCriticalSection
LeaveCriticalSection
GetModuleHandleW
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
DeleteCriticalSection
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
HeapCreate
VirtualFree
HeapFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
SetStdHandle
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
FlushFileBuffers
RtlUnwind
InitializeCriticalSectionAndSpinCount
HeapAlloc
HeapReAlloc
LCMapStringA
MultiByteToWideChar
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
GetConsoleOutputCP
CreateFileA
CloseHandle
user32
ClientToScreen
Sections
.text Size: 67KB - Virtual size: 67KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 3.9MB - Virtual size: 3.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 41KB - Virtual size: 4.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ