Static task
static1
Behavioral task
behavioral1
Sample
ff7e64f09c10ff9a60c9c373304737c6_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ff7e64f09c10ff9a60c9c373304737c6_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
ff7e64f09c10ff9a60c9c373304737c6_JaffaCakes118
-
Size
4.4MB
-
MD5
ff7e64f09c10ff9a60c9c373304737c6
-
SHA1
1335dc5a5375b094e048b0688b1747835cc9e6fc
-
SHA256
e3136658653ccb4779263a546635a34cccaaa6d2c475438a4fabd61a3c59f3c6
-
SHA512
e8e7fdf10caaacabd3e689ee9a83ee2c607074f8e1f10dd08162d91163531a84396faa23186f31dc401eb4173f9fd0ccd102eaea5e7ec76587182f6b11f8de58
-
SSDEEP
98304:/ht7VS9Bmskx2fOu8/6zUJBEGFmHvPD6Xou8W46X9zKGd:/z7oBOcfNE6zsV0Hvr6XjyazKa
Malware Config
Signatures
Files
-
ff7e64f09c10ff9a60c9c373304737c6_JaffaCakes118.exe windows:5 windows x86 arch:x86
d1727cc76cb77410e59de4eb81f68a0b
Code Sign
af:39:1a:91:d4:25:78:7c:ad:39:4d:5c:ca:26:3f:87Certificate
IssuerPOSTALCODE=10197Not Before13-08-2021 15:53Not After13-08-2022 15:53SubjectPOSTALCODE=1019753:fb:3b:0f:80:23:d2:45:fb:8e:8c:b7:45:98:a4:f9:ea:71:27:1c:f9:3c:d6:38:32:84:0a:01:82:29:91:a5Signer
Actual PE Digest53:fb:3b:0f:80:23:d2:45:fb:8e:8c:b7:45:98:a4:f9:ea:71:27:1c:f9:3c:d6:38:32:84:0a:01:82:29:91:a5Digest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
C:\tivob\honukemuceric kubi\63_xemuvuga te.pdb
Imports
kernel32
lstrlenA
GetConsoleAliasesLengthW
EnumDateFormatsExW
MoveFileExA
EndUpdateResourceW
InterlockedIncrement
InterlockedDecrement
ReadConsoleOutputAttribute
GetSystemWindowsDirectoryW
GetEnvironmentStringsW
GetUserDefaultLCID
WaitForSingleObject
SetConsoleScreenBufferSize
SetEvent
CreateActCtxW
GetConsoleCP
LocalShrink
ReadConsoleOutputW
GetVersionExW
GetFileAttributesA
lstrcpynW
GetConsoleAliasW
VerifyVersionInfoA
WriteConsoleW
WritePrivateProfileSectionW
IsBadWritePtr
ReadFile
GetModuleFileNameW
GetComputerNameA
GetSystemDirectoryA
CreateFileW
lstrcatA
GetACP
GetVolumePathNameA
VerifyVersionInfoW
InterlockedExchange
GetLastError
GetProcAddress
EnterCriticalSection
BuildCommDCBW
GetLocalTime
GetProcessId
LocalAlloc
SetCalendarInfoW
DnsHostnameToComputerNameA
CreateTapePartition
SetConsoleDisplayMode
SetFileApisToANSI
GlobalGetAtomNameW
SetEnvironmentVariableA
SetConsoleTitleW
GetModuleHandleA
UpdateResourceW
CancelTimerQueueTimer
GetConsoleTitleW
VirtualProtect
PeekConsoleInputA
FindFirstVolumeW
LCMapStringW
GetCompressedFileSizeA
GetSystemDefaultLangID
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
GetModuleHandleW
Sleep
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
HeapAlloc
FreeEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
DeleteCriticalSection
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
HeapCreate
VirtualFree
HeapFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
LeaveCriticalSection
TerminateProcess
GetCurrentProcess
IsDebuggerPresent
LoadLibraryA
InitializeCriticalSectionAndSpinCount
RaiseException
VirtualAlloc
HeapReAlloc
GetCPInfo
GetOEMCP
IsValidCodePage
RtlUnwind
HeapSize
GetLocaleInfoA
WideCharToMultiByte
GetStringTypeA
MultiByteToWideChar
GetStringTypeW
LCMapStringA
user32
RealGetWindowClassW
Sections
.text Size: 4.3MB - Virtual size: 4.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 40.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 70KB - Virtual size: 69KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ