Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_74f7195bedaa67a844a16d40bf6a07d4fc978caf52a225d8b469e6012f21d8e3.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
JaffaCakes118_74f7195bedaa67a844a16d40bf6a07d4fc978caf52a225d8b469e6012f21d8e3.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_74f7195bedaa67a844a16d40bf6a07d4fc978caf52a225d8b469e6012f21d8e3
-
Size
4.3MB
-
MD5
73cfc764336a69d0c0be8a289989ca3c
-
SHA1
5652774ef1bd0f5854eb36d28113234e5aaa65bc
-
SHA256
74f7195bedaa67a844a16d40bf6a07d4fc978caf52a225d8b469e6012f21d8e3
-
SHA512
9b0bdcdf242b7563aaaead0906bf8c6a6a1398a3914ecd720c93b55146f74d9b7df4b490defe5350545ff6c1337f4b48301bef2d7b2ac9d1f5ffedab1626df39
-
SSDEEP
98304:9gk2eVH7BEWAVK0TTmH5X1YWETsELr3Tb5tuSLUuCUIAl29OApkAZQwayf:aklbB1BoCZ6TssjWS3xMOrA1a6
Malware Config
Signatures
Files
-
JaffaCakes118_74f7195bedaa67a844a16d40bf6a07d4fc978caf52a225d8b469e6012f21d8e3.exe windows:5 windows x86 arch:x86
a512d53961fda703ec5cace6f99ec8a1
Code Sign
c4:39:40:bc:e8:bb:34:a3:9c:7b:aa:ba:35:24:b9:8eCertificate
IssuerPOSTALCODE=10301Not Before20-11-2021 19:31Not After20-11-2022 19:31SubjectPOSTALCODE=10301b2:fd:f6:57:fe:49:a9:04:ee:50:e8:84:5b:d3:e5:27:a5:86:02:72:40:5a:57:ca:20:dc:a6:b3:7d:53:06:21Signer
Actual PE Digestb2:fd:f6:57:fe:49:a9:04:ee:50:e8:84:5b:d3:e5:27:a5:86:02:72:40:5a:57:ca:20:dc:a6:b3:7d:53:06:21Digest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
C:\nujacokoyupu\vajixi52 ga.pdb
Imports
kernel32
FindFirstChangeNotificationW
lstrlenA
CopyFileExW
TlsGetValue
CommConfigDialogA
BuildCommDCBAndTimeoutsA
FreeLibrary
InterlockedIncrement
ZombifyActCtx
SetFirmwareEnvironmentVariableA
SetEnvironmentVariableW
GetNamedPipeHandleStateA
GetProfileSectionA
GetProcessHeap
GetConsoleAliasesLengthA
GetPrivateProfileStringW
GetConsoleTitleA
ReadConsoleW
CreateRemoteThread
GetSystemWow64DirectoryA
CreateActCtxW
TlsSetValue
GetConsoleCP
SetFileShortNameW
GetConsoleMode
TerminateThread
CopyFileW
GetCalendarInfoA
SetVolumeMountPointA
GetVersionExW
LeaveCriticalSection
GlobalFlags
SetDllDirectoryA
HeapValidate
VerifyVersionInfoA
IsDBCSLeadByte
GetModuleFileNameW
GetEnvironmentVariableA
CompareStringW
GetComputerNameA
WritePrivateProfileStringW
CreateJobObjectA
GetPrivateProfileIntW
VerifyVersionInfoW
InterlockedExchange
GetLastError
GetLongPathNameW
SetLastError
GetProcAddress
HeapSize
BackupWrite
CreateNamedPipeA
SearchPathA
GetNumaHighestNodeNumber
GetPrivateProfileStringA
LoadLibraryA
ProcessIdToSessionId
LocalAlloc
GetFileType
SetCurrentDirectoryW
GetVolumePathNamesForVolumeNameA
GetModuleFileNameA
WriteProfileStringA
GetModuleHandleA
FindFirstChangeNotificationA
GetProcessShutdownParameters
FreeEnvironmentStringsW
BuildCommDCBA
GetConsoleCursorInfo
OutputDebugStringA
FindFirstVolumeA
TlsAlloc
GetWindowsDirectoryW
ReadConsoleOutputCharacterW
GetSystemTime
TlsFree
CopyFileExA
CloseHandle
CreateFileW
GetStartupInfoW
ExitProcess
SetStdHandle
EncodePointer
DecodePointer
GetCommandLineW
HeapSetInformation
IsProcessorFeaturePresent
GetCurrentThreadId
GetModuleHandleW
InterlockedDecrement
SetUnhandledExceptionFilter
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
IsBadReadPtr
HeapCreate
WriteFile
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
IsDebuggerPresent
EnterCriticalSection
GetACP
GetOEMCP
GetCPInfo
IsValidCodePage
RtlUnwind
LoadLibraryW
HeapAlloc
HeapReAlloc
HeapQueryInformation
HeapFree
RaiseException
WideCharToMultiByte
LCMapStringW
MultiByteToWideChar
GetStringTypeW
WriteConsoleW
OutputDebugStringW
SetFilePointer
FlushFileBuffers
user32
GetMenuBarInfo
advapi32
InitiateSystemShutdownA
msimg32
GradientFill
Sections
.text Size: 4.2MB - Virtual size: 4.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 39.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tomas Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bux Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.xitoxih Size: 512B - Virtual size: 234B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 26KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 72KB - Virtual size: 71KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ