Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_dd03dfd571a0fc41bc3fcc322169afbc46a7c102b2187cb9a6634f6e029f6d02.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
JaffaCakes118_dd03dfd571a0fc41bc3fcc322169afbc46a7c102b2187cb9a6634f6e029f6d02.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_dd03dfd571a0fc41bc3fcc322169afbc46a7c102b2187cb9a6634f6e029f6d02
-
Size
4.2MB
-
MD5
03204de7ebf7b2fc4b29f9a76b944983
-
SHA1
5ba4c91ce2229b08de78f37ff268915695004993
-
SHA256
dd03dfd571a0fc41bc3fcc322169afbc46a7c102b2187cb9a6634f6e029f6d02
-
SHA512
a7d255d938452189a1b9daf151e1a89d13c360760f271b86e28c20373e1bfb73b32ce30afa6105cc09628d48d6fbd43a6eeabecf696a1b1f4d1d1905e3ab817e
-
SSDEEP
98304:9wJSjXEQ24y0uRlH57uIjZfFF7iXov0WlvIjwN1HBiDxRkywMkGaqSKvn:9wJs24y0Sl5TjZfn06vGwNZBATrhP
Malware Config
Signatures
Files
-
JaffaCakes118_dd03dfd571a0fc41bc3fcc322169afbc46a7c102b2187cb9a6634f6e029f6d02.exe windows:5 windows x86 arch:x86
e26afc83cc50f029d0d1352e4ada9f72
Code Sign
65:19:bc:5e:83:2b:1e:b8:66:e4:cc:fb:48:61:04:f9Certificate
IssuerPOSTALCODE=10305Not Before14-11-2021 14:22Not After14-11-2022 14:22SubjectPOSTALCODE=1030559:35:a5:02:75:38:e7:d2:e0:03:9b:f4:e8:9f:65:c1:61:d1:e2:1f:7d:f2:28:69:1a:c4:5f:20:aa:8c:94:b8Signer
Actual PE Digest59:35:a5:02:75:38:e7:d2:e0:03:9b:f4:e8:9f:65:c1:61:d1:e2:1f:7d:f2:28:69:1a:c4:5f:20:aa:8c:94:b8Digest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
C:\sej.pdb
Imports
kernel32
GetCurrentActCtx
GetEnvironmentStringsW
GetSystemDefaultLCID
GetTickCount
GetProcessHeap
GetSystemTimeAsFileTime
ReadConsoleW
WriteFileGather
SetHandleCount
GlobalAlloc
InitializeCriticalSectionAndSpinCount
Sleep
GetProcessHandleCount
GetSystemWindowsDirectoryA
SetConsoleCP
DeleteVolumeMountPointW
GetFileAttributesA
FindNextVolumeW
SetConsoleCursorPosition
GetAtomNameW
SetLastError
GetProcAddress
VirtualAlloc
EnumDateFormatsExA
GetFirmwareEnvironmentVariableW
EnterCriticalSection
VirtualAllocEx
LoadLibraryA
SetConsoleWindowInfo
GetDefaultCommConfigA
SetConsoleCursorInfo
RequestDeviceWakeup
GetConsoleTitleW
QueryPerformanceFrequency
DuplicateHandle
DeleteAtom
lstrcpyW
LCMapStringW
CreateFileW
WriteConsoleW
SetCriticalSectionSpinCount
HeapAlloc
GetModuleHandleW
ExitProcess
DecodePointer
GetCommandLineW
HeapSetInformation
GetStartupInfoW
LeaveCriticalSection
GetStdHandle
GetFileType
DeleteCriticalSection
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EncodePointer
TerminateProcess
GetCurrentProcess
WriteFile
GetModuleFileNameW
HeapCreate
IsProcessorFeaturePresent
GetLastError
SetFilePointer
HeapFree
CloseHandle
LoadLibraryW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
GetCurrentThreadId
InterlockedDecrement
FreeEnvironmentStringsW
QueryPerformanceCounter
GetCurrentProcessId
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
RtlUnwind
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
RaiseException
SetStdHandle
FlushFileBuffers
HeapSize
HeapReAlloc
MultiByteToWideChar
GetStringTypeW
user32
GetClipCursor
advapi32
AdjustTokenPrivileges
Sections
.text Size: 4.1MB - Virtual size: 4.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 15KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 110KB - Virtual size: 4.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ