Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_06a6adcab79d688211e0b41091320ce0133bd0fadee09e35738af967d23e6129.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_06a6adcab79d688211e0b41091320ce0133bd0fadee09e35738af967d23e6129.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_06a6adcab79d688211e0b41091320ce0133bd0fadee09e35738af967d23e6129
-
Size
4.0MB
-
MD5
2afc1c4deb08a878cd87c628fcd4c8c5
-
SHA1
950640db7f983e26d43bf73b4fca0c82d9bbb96b
-
SHA256
06a6adcab79d688211e0b41091320ce0133bd0fadee09e35738af967d23e6129
-
SHA512
7d33023f6b1ffb27b728be64e2d98c4ee87d09f33ae575a545b8cba03f2452670f8f4408373b12847194b22934fc82dea88dbaa250d171bc206d2a81efa914e1
-
SSDEEP
98304:5eJ2HoLf3a+RNUI9t6FMN95U5baz1NkKHfRHXaKVshrIVr:YJKor3a+H7KMnb1HRHXaK+hsVr
Malware Config
Signatures
Files
-
JaffaCakes118_06a6adcab79d688211e0b41091320ce0133bd0fadee09e35738af967d23e6129.exe windows:5 windows x86 arch:x86
838f718910cdf3a4ebf0855233529379
Code Sign
ea:9a:70:98:08:00:fc:02:c0:e0:62:b6:0d:82:a0:45Certificate
IssuerPOSTALCODE=10305Not Before27-09-2022 02:39Not After27-09-2023 02:39SubjectPOSTALCODE=103059a:08:4b:d7:13:62:ae:37:9a:44:a6:da:e7:1a:dc:f7:07:3b:dc:21:9d:31:e1:eb:b5:5d:ea:6a:f8:4b:d0:55Signer
Actual PE Digest9a:08:4b:d7:13:62:ae:37:9a:44:a6:da:e7:1a:dc:f7:07:3b:dc:21:9d:31:e1:eb:b5:5d:ea:6a:f8:4b:d0:55Digest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
C:\dowediyuxeg\devosafajok wilawulolic\ditalelapupo.pdb
Imports
kernel32
LocalShrink
InterlockedExchange
GetSystemTimeAdjustment
SetLocaleInfoW
FindNextVolumeW
FindNextChangeNotification
CopyFileExA
MoveFileWithProgressW
GetProfileSectionW
VerifyVersionInfoA
LocalSize
FileTimeToDosDateTime
FindFirstChangeNotificationW
GlobalGetAtomNameA
FindResourceExA
GetComputerNameExA
GetModuleHandleW
GetTempPathW
BuildCommDCBAndTimeoutsW
GetProcAddress
LoadLibraryA
GetFileTime
SetConsoleScreenBufferSize
VirtualLock
GetPrivateProfileStructA
GetWindowsDirectoryW
GetCPInfoExA
PostQueuedCompletionStatus
GlobalFindAtomA
TerminateJobObject
lstrcpynA
WriteConsoleA
GetBinaryTypeA
GetLastError
SearchPathW
GetCommandLineW
InterlockedIncrement
GetCalendarInfoA
GetConsoleTitleA
CreateActCtxW
FormatMessageW
GetConsoleAliasA
OpenWaitableTimerA
GetModuleHandleA
LoadLibraryW
TerminateProcess
GetSystemDirectoryW
EnterCriticalSection
EnumSystemLocalesA
GetStringTypeExW
OpenMutexW
TransactNamedPipe
SearchPathA
FindResourceW
GetProcessTimes
GetOverlappedResult
GetPrivateProfileStructW
DeleteFiber
InterlockedExchangeAdd
EnumDateFormatsA
InterlockedDecrement
FindActCtxSectionStringW
SetConsoleCursorPosition
RegisterWaitForSingleObject
GlobalAlloc
QueryMemoryResourceNotification
SetLastError
GetProcessPriorityBoost
GetMailslotInfo
SetFilePointer
GetConsoleMode
HeapReAlloc
HeapAlloc
DeleteFileA
GetCommandLineA
GetStartupInfoA
DeleteCriticalSection
LeaveCriticalSection
HeapCreate
VirtualFree
HeapFree
VirtualAlloc
SetUnhandledExceptionFilter
Sleep
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
GetCurrentThreadId
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetCurrentProcess
UnhandledExceptionFilter
IsDebuggerPresent
InitializeCriticalSectionAndSpinCount
RtlUnwind
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
HeapSize
GetLocaleInfoA
LCMapStringA
MultiByteToWideChar
LCMapStringW
GetStringTypeA
GetStringTypeW
user32
CharUpperW
Sections
.text Size: 45KB - Virtual size: 44KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 3.9MB - Virtual size: 5.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 3.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ