Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_2c5f97eb5a1560c881cba79b8f174cf0af513e3a4fbf2d0bbada9a0963b23982.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_2c5f97eb5a1560c881cba79b8f174cf0af513e3a4fbf2d0bbada9a0963b23982.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_2c5f97eb5a1560c881cba79b8f174cf0af513e3a4fbf2d0bbada9a0963b23982
-
Size
4.4MB
-
MD5
c95bd64e47c0a0b18d28926432691bc3
-
SHA1
708f0de596060b21063ab23d4c068e928302413a
-
SHA256
2c5f97eb5a1560c881cba79b8f174cf0af513e3a4fbf2d0bbada9a0963b23982
-
SHA512
a57e02670ca443433eb36d1088d018132d9e5c06101fdb6d61d5dcf62db2cc0cd92ed848118b2dd5295315b6c713845b86eb8323823d25826366b64d931364d9
-
SSDEEP
98304:fEVlD2yKIgjOTR7zgj96Tn/6Wob9RVJvvuaWSX:f2lKyK1mRXgLWS1huiX
Malware Config
Signatures
Files
-
JaffaCakes118_2c5f97eb5a1560c881cba79b8f174cf0af513e3a4fbf2d0bbada9a0963b23982.exe windows:5 windows x86 arch:x86
f530acf7acd4a5c8880ba2a4704d4cbb
Code Sign
04:f2:6a:ae:6f:1b:b2:1f:26:9e:6d:e9:87:2d:25:b9Certificate
IssuerPOSTALCODE=10188Not Before04-09-2021 21:16Not After04-09-2022 21:16SubjectPOSTALCODE=101887a:d6:4b:3b:87:8a:f4:21:ab:47:46:69:e6:8a:a4:c0:ca:b6:45:3e:a3:a4:cb:0b:d2:c7:0a:a8:ff:fb:37:91Signer
Actual PE Digest7a:d6:4b:3b:87:8a:f4:21:ab:47:46:69:e6:8a:a4:c0:ca:b6:45:3e:a3:a4:cb:0b:d2:c7:0a:a8:ff:fb:37:91Digest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
C:\leramuroy\dahetarugah\xem ke.pdb
Imports
kernel32
lstrcpynA
GetDefaultCommConfigW
ReadConsoleA
InterlockedDecrement
SetEnvironmentVariableW
GetEnvironmentStringsW
GetUserDefaultLCID
SetVolumeMountPointW
GetSystemDefaultLCID
EnumCalendarInfoExW
InitializeCriticalSectionAndSpinCount
GetSystemWindowsDirectoryA
LeaveCriticalSection
GetComputerNameExA
ReadFile
GetModuleFileNameW
GetACP
LCMapStringA
VerifyVersionInfoW
InterlockedExchange
GetProcAddress
PeekConsoleInputW
VerLanguageNameA
CopyFileA
GetLocalTime
WriteConsoleA
LocalAlloc
SetConsoleOutputCP
Module32FirstW
GetModuleFileNameA
GetModuleHandleA
QueueUserWorkItem
GetConsoleTitleW
PeekConsoleInputA
ReadConsoleInputW
GetCurrentProcessId
AddConsoleAliasA
FindNextVolumeA
PulseEvent
GetCommandLineW
GetStartupInfoW
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetModuleHandleW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
GetLastError
Sleep
HeapSize
ExitProcess
EnterCriticalSection
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
SetFilePointer
WriteFile
FreeEnvironmentStringsW
HeapCreate
VirtualFree
HeapFree
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
GetCPInfo
GetOEMCP
IsValidCodePage
RaiseException
HeapAlloc
HeapReAlloc
VirtualAlloc
LoadLibraryA
RtlUnwind
SetStdHandle
FlushFileBuffers
GetConsoleOutputCP
WriteConsoleW
MultiByteToWideChar
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
CreateFileA
CloseHandle
gdi32
GetCharWidthFloatW
Sections
.text Size: 4.3MB - Virtual size: 4.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 29.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 123KB - Virtual size: 122KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ