Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_15e3d3f5e77dc308b70f039d5e8c0f3af33d7bdcbd236f50614e4c0a4beed8fd.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
JaffaCakes118_15e3d3f5e77dc308b70f039d5e8c0f3af33d7bdcbd236f50614e4c0a4beed8fd.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_15e3d3f5e77dc308b70f039d5e8c0f3af33d7bdcbd236f50614e4c0a4beed8fd
-
Size
4.1MB
-
MD5
394446b9d82e2aa966185cc889e6c8a8
-
SHA1
b144d17b17150a2f66edb5ab45daa0854363582a
-
SHA256
15e3d3f5e77dc308b70f039d5e8c0f3af33d7bdcbd236f50614e4c0a4beed8fd
-
SHA512
842f713bd31801d7329e1a3a5999097cd2082fcfe385f57472f0935325e88d6e0fc3084e9f3035b7b6c8907011d10e1b0d9cbb787077bdb50042336330459238
-
SSDEEP
98304:r6DiGPFSULoAjVqV+5gauphlABX9l9BPNeCovEEgaamR/N0Q5G7kSyT:e14U8+I6uUXnTna2aae/+Q5G7k3
Malware Config
Signatures
Files
-
JaffaCakes118_15e3d3f5e77dc308b70f039d5e8c0f3af33d7bdcbd236f50614e4c0a4beed8fd.exe windows:5 windows x86 arch:x86
21d1aba330d6afd437c1c98f49458148
Code Sign
38:90:15:9a:1c:e7:4c:fd:ab:18:90:44:ef:64:16:48Certificate
IssuerPOSTALCODE=10305Not Before16-10-2022 04:50Not After16-10-2023 04:50SubjectPOSTALCODE=10305ba:4e:95:08:40:0b:b2:b2:ec:d7:da:b7:bc:4a:37:a2:0c:bd:8b:10:bd:e2:75:ec:61:28:e3:c5:98:cd:10:adSigner
Actual PE Digestba:4e:95:08:40:0b:b2:b2:ec:d7:da:b7:bc:4a:37:a2:0c:bd:8b:10:bd:e2:75:ec:61:28:e3:c5:98:cd:10:adDigest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
C:\zevucem\mider-sox\hayazize\27_hibifahime.pdb
Imports
kernel32
InterlockedIncrement
SetComputerNameW
GetFileAttributesExA
MoveFileWithProgressA
IsBadReadPtr
GetNumberFormatA
WaitNamedPipeW
SetCommTimeouts
SetFileShortNameW
LoadLibraryW
CreateEventA
SetVolumeMountPointA
GetFileAttributesA
DnsHostnameToComputerNameW
GetConsoleAliasW
SetTimeZoneInformation
GetBinaryTypeA
GetGeoInfoA
GetCompressedFileSizeA
IsBadStringPtrA
CreateMutexW
GetLastError
GetProcAddress
VirtualAlloc
HeapSize
GlobalGetAtomNameA
SetFileAttributesA
LoadLibraryA
WriteConsoleA
LocalAlloc
AddAtomW
FoldStringA
EnumResourceTypesW
FindNextFileA
GetModuleHandleA
ReadConsoleInputW
GetVersion
LCMapStringA
GetSystemDefaultLangID
GetStartupInfoW
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetModuleHandleW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
InterlockedDecrement
Sleep
ExitProcess
EnterCriticalSection
LeaveCriticalSection
HeapFree
SetFilePointer
WriteFile
GetStdHandle
GetModuleFileNameA
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
DeleteCriticalSection
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
HeapAlloc
HeapReAlloc
InitializeCriticalSectionAndSpinCount
RtlUnwind
RaiseException
SetStdHandle
FlushFileBuffers
GetConsoleOutputCP
WriteConsoleW
MultiByteToWideChar
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
CreateFileA
CloseHandle
advapi32
DeregisterEventSource
ole32
WriteFmtUserTypeStg
Sections
.text Size: 80KB - Virtual size: 80KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 3.9MB - Virtual size: 3.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 43KB - Virtual size: 4.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ