Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_a38b7dff7c5a463cbde436fc4551c5e07b056697990c14851dddd8507656b872.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_a38b7dff7c5a463cbde436fc4551c5e07b056697990c14851dddd8507656b872.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_a38b7dff7c5a463cbde436fc4551c5e07b056697990c14851dddd8507656b872
-
Size
4.4MB
-
MD5
23207e44fb8a73e682e4525adeb26902
-
SHA1
ef57aa7f4d8a70d36f250999078bd01ef8e7837d
-
SHA256
a38b7dff7c5a463cbde436fc4551c5e07b056697990c14851dddd8507656b872
-
SHA512
a44a49886231286de1dad4aea543eae0d7d4554f843a65a7f7ce81e2b76877bc42492dc20bca8f3012f038addcd08a1650b024fd9ab759c1395e6a8606ec89c1
-
SSDEEP
98304:HW7444Ds+/tPj4k6/6VdkNUgnTaddh9k2YUX5Wy64a:Ha4Xlxj4kHKnkdh9bH5NFa
Malware Config
Signatures
Files
-
JaffaCakes118_a38b7dff7c5a463cbde436fc4551c5e07b056697990c14851dddd8507656b872.exe windows:5 windows x86 arch:x86
b3447c394869d3e708c4373cd10a2b6b
Code Sign
55:3f:18:ae:ff:55:e7:18:56:dc:fd:a6:96:70:6b:90Certificate
IssuerPOSTALCODE=10051Not Before28-09-2021 07:22Not After28-09-2022 07:22SubjectPOSTALCODE=100518c:53:5e:32:7e:5b:e4:f8:1e:bd:92:9a:d5:6f:92:b9:39:39:e6:94:c2:6f:99:2d:27:2f:99:3d:dd:84:bd:2dSigner
Actual PE Digest8c:53:5e:32:7e:5b:e4:f8:1e:bd:92:9a:d5:6f:92:b9:39:39:e6:94:c2:6f:99:2d:27:2f:99:3d:dd:84:bd:2dDigest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
C:\jesusuyex4\bisiramuha xorodijohare_geridemi.pdb
Imports
kernel32
TlsGetValue
InterlockedIncrement
GetCommState
GetProfileStringW
UnlockFile
CallNamedPipeW
FreeEnvironmentStringsA
GetNumberFormatA
FindResourceExA
GlobalAlloc
GetPrivateProfileIntA
GetConsoleAliasExesLengthW
HeapDestroy
CreateSemaphoreA
EnumResourceLanguagesA
GetModuleFileNameW
GetCompressedFileSizeA
GetSystemDirectoryA
CreateActCtxA
GetBinaryTypeW
lstrlenW
LCMapStringA
GetStartupInfoA
SetThreadLocale
GetStdHandle
CopyFileExW
FreeLibraryAndExitThread
GetLastError
GetProcAddress
CreateNamedPipeA
EnterCriticalSection
LoadLibraryA
OpenMutexA
WritePrivateProfileStringA
SetThreadIdealProcessor
FindAtomA
SetSystemTime
FindNextFileA
WriteProfileStringA
CreateIoCompletionPort
GetModuleHandleA
FindFirstChangeNotificationA
HeapSetInformation
GetCurrentDirectoryA
SetFileShortNameA
FindAtomW
UnregisterWaitEx
GetSystemTime
DeleteFileA
GetVolumeInformationW
LocalFileTimeToFileTime
GetThreadContext
GetCPInfoExW
GetCommandLineW
WideCharToMultiByte
EncodePointer
DecodePointer
GetStartupInfoW
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
InterlockedDecrement
GetACP
GetOEMCP
GetCPInfo
IsValidCodePage
TlsAlloc
TlsSetValue
GetCurrentThreadId
TlsFree
GetModuleHandleW
SetLastError
HeapValidate
IsBadReadPtr
ExitProcess
LeaveCriticalSection
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
FreeEnvironmentStringsW
GetEnvironmentStringsW
HeapCreate
WriteFile
IsProcessorFeaturePresent
OutputDebugStringA
WriteConsoleW
OutputDebugStringW
LoadLibraryW
RtlUnwind
LCMapStringW
MultiByteToWideChar
GetStringTypeW
SetFilePointer
GetConsoleCP
GetConsoleMode
HeapAlloc
GetModuleFileNameA
HeapReAlloc
HeapSize
HeapQueryInformation
HeapFree
SetStdHandle
FlushFileBuffers
RaiseException
CreateFileW
CloseHandle
advapi32
InitiateSystemShutdownA
AbortSystemShutdownA
winhttp
WinHttpOpen
Sections
.text Size: 105KB - Virtual size: 104KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 33KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4.2MB - Virtual size: 43.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 66KB - Virtual size: 66KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ