Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_f6e23899e76f863ec8078188b5070fe6bf0c912c18838c6be2d7ea9ceda028cb.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_f6e23899e76f863ec8078188b5070fe6bf0c912c18838c6be2d7ea9ceda028cb.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_f6e23899e76f863ec8078188b5070fe6bf0c912c18838c6be2d7ea9ceda028cb
-
Size
4.4MB
-
MD5
669a35ce66ea50da5a4d845cdf6d2e44
-
SHA1
9613e491d4552ea31188c6bfc4a6422120f5c2e5
-
SHA256
f6e23899e76f863ec8078188b5070fe6bf0c912c18838c6be2d7ea9ceda028cb
-
SHA512
bec16868ff08f56528b2222f9e3c0ec7334e8a95892a0aa1edc124913fb478338ab9527c97d97e9fd5553499e6fd4e1b8609893f535258879215a63d12164e19
-
SSDEEP
98304:MV76JmgkdO8INwHnU5KjCOvdTk+OfRg8CcmvBAh3dyZS5U5:MFSmgwO8INwHU5KjCOvBgflC7vS3dD5e
Malware Config
Signatures
Files
-
JaffaCakes118_f6e23899e76f863ec8078188b5070fe6bf0c912c18838c6be2d7ea9ceda028cb.exe windows:5 windows x86 arch:x86
a0a666636aca5f36444e237f86f70507
Code Sign
4c:78:79:44:70:53:4b:c4:cc:1f:38:85:69:28:4c:09Certificate
IssuerPOSTALCODE=10051Not Before15-09-2021 06:17Not After15-09-2022 06:17SubjectPOSTALCODE=1005178:01:00:fc:2a:e9:a3:9e:05:15:40:f9:ad:ab:47:23:14:8b:0b:44:2a:75:e9:ac:7d:7d:b1:0b:e8:30:f8:c0Signer
Actual PE Digest78:01:00:fc:2a:e9:a3:9e:05:15:40:f9:ad:ab:47:23:14:8b:0b:44:2a:75:e9:ac:7d:7d:b1:0b:e8:30:f8:c0Digest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
C:\kikukune-4\f.pdb
Imports
kernel32
GetLocaleInfoA
LoadResource
FindActCtxSectionGuid
ReadConsoleA
InterlockedDecrement
GetCurrentProcess
GetEnvironmentStringsW
GetUserDefaultLCID
WaitForSingleObject
AddConsoleAliasW
FindActCtxSectionStringA
GetUserDefaultLangID
InitializeCriticalSection
ReadConsoleInputA
GetSystemWindowsDirectoryA
PulseEvent
VerifyVersionInfoA
WriteConsoleW
GetModuleFileNameW
ReleaseSemaphore
GetConsoleOutputCP
GetProcAddress
EnterCriticalSection
PrepareTape
OpenMutexA
LocalAlloc
GlobalGetAtomNameW
WaitForMultipleObjects
SetSystemTime
GetModuleFileNameA
SetConsoleTitleW
GetModuleHandleA
FindFirstVolumeA
GetProfileSectionW
LeaveCriticalSection
GetCommandLineW
HeapAlloc
GetStartupInfoW
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
DeleteCriticalSection
HeapFree
VirtualFree
VirtualAlloc
HeapReAlloc
HeapCreate
GetModuleHandleW
Sleep
ExitProcess
WriteFile
GetStdHandle
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
GetLastError
HeapSize
RtlUnwind
SetHandleCount
GetFileType
GetStartupInfoA
SetFilePointer
CloseHandle
FreeEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
InitializeCriticalSectionAndSpinCount
LoadLibraryA
CreateFileA
RaiseException
SetStdHandle
FlushFileBuffers
WriteConsoleA
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
SetEndOfFile
GetProcessHeap
ReadFile
Exports
Exports
@SetViceVariants@12
Sections
.text Size: 4.3MB - Virtual size: 4.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 29.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 47KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ