Static task
static1
Behavioral task
behavioral1
Sample
10b8253c4e13b73a770ae45ed7535f88249c96f0598e7acec6aebf7d56991b0e.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
10b8253c4e13b73a770ae45ed7535f88249c96f0598e7acec6aebf7d56991b0e.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_a0c7c04d179e09985d9c05a4604e0f94de03a277a69063766e7ada76a409c2b8
-
Size
4.3MB
-
MD5
ec03896a8a190b39b474ec90a3b78f09
-
SHA1
80d945c57d13e1ab2e596432d2a04b9d96aac37d
-
SHA256
a0c7c04d179e09985d9c05a4604e0f94de03a277a69063766e7ada76a409c2b8
-
SHA512
87c6794ac9e6538b2df84b3ab76b1b8753273d5ee572cce6c67026fdb3b820da5a859047744678586eac7b6bdfed9822219d789c8866e01cbea1a4f90666957a
-
SSDEEP
98304:uerWQJgiWy4NWntC5Mnz413W5F3EDgjcdhtvrsvtDTh5Fa91pfTTQIo:uerxJmykSrE13WSguvrsvtDFa91pfvto
Malware Config
Signatures
Files
-
JaffaCakes118_a0c7c04d179e09985d9c05a4604e0f94de03a277a69063766e7ada76a409c2b8.zip
Password: infected
-
10b8253c4e13b73a770ae45ed7535f88249c96f0598e7acec6aebf7d56991b0e.exe windows:5 windows x86 arch:x86
df8e3b2b5760b115b1506325969ed248
Code Sign
5e:87:65:2a:fd:5d:42:33:f2:74:52:bf:9a:21:19:7fCertificate
IssuerPOSTALCODE=10062Not Before17-06-2021 10:54Not After17-06-2022 10:54SubjectPOSTALCODE=100622d:fd:8c:a1:99:6f:c9:11:43:54:d8:09:c3:cc:6a:29:da:8f:14:c3:9d:45:5d:f3:68:f2:4b:c9:07:75:41:7bSigner
Actual PE Digest2d:fd:8c:a1:99:6f:c9:11:43:54:d8:09:c3:cc:6a:29:da:8f:14:c3:9d:45:5d:f3:68:f2:4b:c9:07:75:41:7bDigest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
C:\yumu_hefirutunudug\bicikigut50\sex\w.pdb
Imports
kernel32
GetFileSize
SetLocalTime
SetEndOfFile
GetNumberOfConsoleInputEvents
FindResourceExW
MapUserPhysicalPages
GetCommState
InterlockedDecrement
ScrollConsoleScreenBufferW
GetProfileSectionA
WriteConsoleInputA
SetComputerNameW
GetComputerNameW
CallNamedPipeW
GetModuleHandleW
GetSystemWow64DirectoryA
CreateDirectoryExW
GetDriveTypeA
TlsSetValue
GlobalAlloc
GetVolumeInformationA
Sleep
ReadFileScatter
GetSystemTimeAdjustment
InterlockedPopEntrySList
GlobalFlags
Beep
VerifyVersionInfoA
IsDBCSLeadByte
ReadFile
CreateFileW
GetBinaryTypeW
CompareStringW
GetACP
lstrlenW
GetConsoleOutputCP
CreateDirectoryA
InterlockedExchange
GetStdHandle
FindFirstFileA
GlobalFix
GetProcAddress
SetVolumeLabelW
WriteProfileSectionA
CreateMemoryResourceNotification
SearchPathA
GetPrivateProfileStringA
SetFileApisToOEM
GetAtomNameA
Process32FirstW
OpenWaitableTimerW
IsSystemResumeAutomatic
GetCommMask
AddAtomA
GetSystemInfo
SetSystemTime
EnumResourceTypesW
SetConsoleCursorInfo
CreateIoCompletionPort
SetConsoleTitleW
GetModuleHandleA
FreeEnvironmentStringsW
EnumResourceNamesA
GetConsoleTitleW
BuildCommDCBA
GetCurrentDirectoryA
CompareStringA
SetCalendarInfoA
GetVersionExA
GetWindowsDirectoryW
GetCurrentProcessId
SuspendThread
LCMapStringW
CopyFileExA
DeleteFileA
CreateFileA
OpenMutexW
GetCommandLineW
GetLastError
GetStartupInfoW
HeapValidate
IsBadReadPtr
RaiseException
EnterCriticalSection
LeaveCriticalSection
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetModuleFileNameW
DeleteCriticalSection
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetSystemTimeAsFileTime
InterlockedIncrement
ExitProcess
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetStartupInfoA
TlsGetValue
TlsAlloc
TlsFree
SetLastError
HeapDestroy
HeapCreate
HeapFree
VirtualFree
GetModuleFileNameA
WriteFile
HeapAlloc
HeapSize
HeapReAlloc
VirtualAlloc
GetOEMCP
GetCPInfo
IsValidCodePage
RtlUnwind
DebugBreak
OutputDebugStringA
WriteConsoleW
OutputDebugStringW
LoadLibraryW
MultiByteToWideChar
InitializeCriticalSectionAndSpinCount
LoadLibraryA
WideCharToMultiByte
LCMapStringA
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
FlushFileBuffers
GetConsoleCP
GetConsoleMode
SetFilePointer
CloseHandle
SetStdHandle
WriteConsoleA
user32
GetListBoxInfo
GetMenuInfo
GetComboBoxInfo
GetMenuBarInfo
advapi32
InitiateSystemShutdownW
Exports
Exports
_futurama@4
_hiduk@8
_regulmoto@4
Sections
.text Size: 4.4MB - Virtual size: 4.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 47KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 4.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 10KB - Virtual size: 158KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 37KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ