Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_729b4a1808ab2a363fd97ec74d8f58bcd24eaaf68f43a4792db0900ea9f36ec0.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_729b4a1808ab2a363fd97ec74d8f58bcd24eaaf68f43a4792db0900ea9f36ec0.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_729b4a1808ab2a363fd97ec74d8f58bcd24eaaf68f43a4792db0900ea9f36ec0
-
Size
4.2MB
-
MD5
5b018ce13395731e06445c6e6b56da09
-
SHA1
adcbbf75ddc201a0df36f3c8366b8bb2e6ba1584
-
SHA256
729b4a1808ab2a363fd97ec74d8f58bcd24eaaf68f43a4792db0900ea9f36ec0
-
SHA512
f7a48a9d80283e004949742e1ff0a560315e85b83b0340dd0a634d74a78fb4467bf897056d1a86ce18c5eea7e28b6e7c411af366643750a646382df7649c5851
-
SSDEEP
98304:4/CIbqkEfDCtcKtsrqYV+wdnanmxXJC01bQDN4GFcyn:4qxKULFwoJn1bQuGFcyn
Malware Config
Signatures
Files
-
JaffaCakes118_729b4a1808ab2a363fd97ec74d8f58bcd24eaaf68f43a4792db0900ea9f36ec0.exe windows:5 windows x86 arch:x86
804abf6bfd1eb86d699699dd471c7b89
Code Sign
17:28:1d:ec:02:77:3a:ab:1f:30:87:04:6d:66:27:9bCertificate
IssuerPOSTALCODE=10305Not Before15-11-2021 03:08Not After15-11-2022 03:08SubjectPOSTALCODE=103054f:48:bd:c5:91:8f:ba:70:c1:6a:ac:ac:a3:d8:24:83:a7:d5:e7:15:9e:be:da:0b:e2:a3:e8:0d:53:bd:77:04Signer
Actual PE Digest4f:48:bd:c5:91:8f:ba:70:c1:6a:ac:ac:a3:d8:24:83:a7:d5:e7:15:9e:be:da:0b:e2:a3:e8:0d:53:bd:77:04Digest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
C:\wanedaxu\14\layilanas\vihona wor.pdb
Imports
kernel32
GetEnvironmentStringsW
GetTickCount
GetConsoleAliasesA
GetSystemTimeAsFileTime
ReadConsoleW
WriteFileGather
SetHandleCount
GlobalAlloc
InitializeCriticalSectionAndSpinCount
Sleep
GetProcessHandleCount
GetSystemWindowsDirectoryA
SetConsoleCP
DeleteVolumeMountPointW
FindNextVolumeW
SetConsoleCursorPosition
GetAtomNameW
GetCPInfoExW
SetLastError
GetProcAddress
VirtualAlloc
BeginUpdateResourceW
EnumDateFormatsExA
GetFirmwareEnvironmentVariableW
LoadLibraryA
WriteConsoleA
UnhandledExceptionFilter
CreateHardLinkW
GetDefaultCommConfigA
SetConsoleCursorInfo
IsDebuggerPresent
RequestDeviceWakeup
QueryPerformanceFrequency
DuplicateHandle
DeleteAtom
lstrcpyW
SetCriticalSectionSpinCount
LCMapStringA
HeapAlloc
GetModuleHandleW
ExitProcess
DecodePointer
GetCommandLineW
HeapSetInformation
GetStartupInfoW
EnterCriticalSection
LeaveCriticalSection
GetStdHandle
GetFileType
DeleteCriticalSection
SetUnhandledExceptionFilter
EncodePointer
TerminateProcess
GetCurrentProcess
WriteFile
GetModuleFileNameW
HeapCreate
IsProcessorFeaturePresent
GetLastError
SetFilePointer
HeapFree
CloseHandle
LoadLibraryW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
GetCurrentThreadId
InterlockedDecrement
FreeEnvironmentStringsW
QueryPerformanceCounter
GetCurrentProcessId
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
RtlUnwind
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
RaiseException
SetStdHandle
FlushFileBuffers
HeapSize
HeapReAlloc
WriteConsoleW
MultiByteToWideChar
LCMapStringW
GetStringTypeW
CreateFileW
user32
GetClipCursor
advapi32
AdjustTokenPrivileges
Sections
.text Size: 4.1MB - Virtual size: 4.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 15KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 110KB - Virtual size: 4.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ