Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_323088cc0372d60d819cddc8dfc64f814f76c3be658dd0320203a800df6f7429.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_323088cc0372d60d819cddc8dfc64f814f76c3be658dd0320203a800df6f7429.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_323088cc0372d60d819cddc8dfc64f814f76c3be658dd0320203a800df6f7429
-
Size
4.4MB
-
MD5
c619e286978c8c34fda38d303b14be35
-
SHA1
0bbd7476860b7101c1aa9bac31637e76678f15ed
-
SHA256
323088cc0372d60d819cddc8dfc64f814f76c3be658dd0320203a800df6f7429
-
SHA512
942cf4e7f08885f0772c35f5d8b77e5ea7833bf532b8189e5ab19febfc83198bf0b4d59f399170f2964bee17cc18d2c266022866c3a4394f3db03d9b9ec536e9
-
SSDEEP
98304:Kv5ymCkjWLCQ27ksJHJJybs5eVvRYqa72use3wFCNuy:Kvb8LF6Hiieb/a7n/XNuy
Malware Config
Signatures
Files
-
JaffaCakes118_323088cc0372d60d819cddc8dfc64f814f76c3be658dd0320203a800df6f7429.exe windows:5 windows x86 arch:x86
f530acf7acd4a5c8880ba2a4704d4cbb
Code Sign
a2:e0:40:6c:ef:b7:48:27:c3:ab:40:16:9f:f7:fe:4bCertificate
IssuerPOSTALCODE=10051Not Before05-09-2021 05:31Not After05-09-2022 05:31SubjectPOSTALCODE=10051d7:d8:4e:11:99:0d:83:65:49:87:69:bc:09:d1:54:6a:5b:61:d7:d7:51:ae:ce:fd:a2:01:19:06:7e:2d:fd:70Signer
Actual PE Digestd7:d8:4e:11:99:0d:83:65:49:87:69:bc:09:d1:54:6a:5b:61:d7:d7:51:ae:ce:fd:a2:01:19:06:7e:2d:fd:70Digest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
C:\bofibevali-bofazenapi8.pdb
Imports
kernel32
lstrcpynA
GetDefaultCommConfigW
ReadConsoleA
InterlockedDecrement
SetEnvironmentVariableW
GetEnvironmentStringsW
GetUserDefaultLCID
SetVolumeMountPointW
GetSystemDefaultLCID
EnumCalendarInfoExW
InitializeCriticalSectionAndSpinCount
GetSystemWindowsDirectoryA
LeaveCriticalSection
GetComputerNameExA
ReadFile
GetModuleFileNameW
GetACP
LCMapStringA
VerifyVersionInfoW
InterlockedExchange
GetProcAddress
PeekConsoleInputW
VerLanguageNameA
CopyFileA
GetLocalTime
WriteConsoleA
LocalAlloc
SetConsoleOutputCP
Module32FirstW
GetModuleFileNameA
GetModuleHandleA
QueueUserWorkItem
GetConsoleTitleW
PeekConsoleInputA
ReadConsoleInputW
GetCurrentProcessId
AddConsoleAliasA
FindNextVolumeA
PulseEvent
GetCommandLineW
GetStartupInfoW
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetModuleHandleW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
GetLastError
Sleep
HeapSize
ExitProcess
EnterCriticalSection
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
SetFilePointer
WriteFile
FreeEnvironmentStringsW
HeapCreate
VirtualFree
HeapFree
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
GetCPInfo
GetOEMCP
IsValidCodePage
RaiseException
HeapAlloc
HeapReAlloc
VirtualAlloc
LoadLibraryA
RtlUnwind
SetStdHandle
FlushFileBuffers
GetConsoleOutputCP
WriteConsoleW
MultiByteToWideChar
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
CreateFileA
CloseHandle
gdi32
GetCharWidthFloatW
Sections
.text Size: 4.3MB - Virtual size: 4.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 29.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 124KB - Virtual size: 124KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ