Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_c50181b8974f9dc55eee503b1d6dd774fc45c791106ed30fb5d3ceb3dae4964a.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_c50181b8974f9dc55eee503b1d6dd774fc45c791106ed30fb5d3ceb3dae4964a.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_c50181b8974f9dc55eee503b1d6dd774fc45c791106ed30fb5d3ceb3dae4964a
-
Size
4.2MB
-
MD5
c9400d7b84fb4e47d35b75e1980f8b8a
-
SHA1
955a36223bba4dcd8a185adbdf385d5920b71615
-
SHA256
c50181b8974f9dc55eee503b1d6dd774fc45c791106ed30fb5d3ceb3dae4964a
-
SHA512
b51f3408e480205c6d461d634005a3efacf77fc8cd0eed01ecf654f27c7aedc36ae6b1bf542ce59b459be3ecb1fcf419e74020c83950ee3c194fae857b65bdfb
-
SSDEEP
98304:gwDN1nyZWUuWtM2NTK35H9aijofTj6FWfvoUrj:T1yAU7tF8Hhl6j
Malware Config
Signatures
Files
-
JaffaCakes118_c50181b8974f9dc55eee503b1d6dd774fc45c791106ed30fb5d3ceb3dae4964a.exe windows:5 windows x86 arch:x86
84e6accbe2ee6e92f38284e9b523500f
Code Sign
4c:17:a2:c7:37:c7:bc:7e:d1:73:46:d1:2e:cb:8e:8cCertificate
IssuerPOSTALCODE=10305Not Before22-11-2021 10:19Not After22-11-2022 10:19SubjectPOSTALCODE=1030549:3c:a2:2b:77:a8:bc:32:b5:5a:ce:88:d5:69:9b:be:6d:e5:dc:e7:6f:05:a8:f8:88:2c:ca:7d:04:89:b3:e6Signer
Actual PE Digest49:3c:a2:2b:77:a8:bc:32:b5:5a:ce:88:d5:69:9b:be:6d:e5:dc:e7:6f:05:a8:f8:88:2c:ca:7d:04:89:b3:e6Digest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
C:\tohodag_78\paga-pozex\89-kocisoxowa-kanigu.pdb
Imports
kernel32
GetSystemDefaultLangID
HeapCompact
LoadResource
GetEnvironmentStringsW
SetHandleInformation
WaitForSingleObject
GetConsoleAliasesLengthA
GetSystemTimeAsFileTime
GetConsoleTitleA
GlobalAlloc
GetFirmwareEnvironmentVariableA
GetLocaleInfoW
CopyFileW
GetProcessHandleCount
LeaveCriticalSection
GetFileAttributesA
SetConsoleCursorPosition
GetFileAttributesW
GetDevicePowerState
LCMapStringA
GetConsoleAliasesW
GetLastError
GetProcAddress
VirtualAlloc
LoadLibraryA
LockResource
WaitForMultipleObjects
EnumResourceTypesW
EnumDateFormatsA
FillConsoleOutputAttribute
GlobalAddAtomW
CheckRemoteDebuggerPresent
EnumCalendarInfoExA
LocalFree
LCMapStringW
EncodePointer
DecodePointer
GetCommandLineW
HeapSetInformation
GetStartupInfoW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
GetCurrentProcess
HeapAlloc
HeapFree
EnterCriticalSection
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
Sleep
HeapSize
GetModuleHandleW
ExitProcess
SetFilePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
CloseHandle
WriteFile
GetModuleFileNameW
FreeEnvironmentStringsW
HeapCreate
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
RtlUnwind
HeapReAlloc
LoadLibraryW
ReadFile
SetStdHandle
FlushFileBuffers
RaiseException
WriteConsoleW
MultiByteToWideChar
GetStringTypeW
IsProcessorFeaturePresent
CreateFileW
user32
SetCaretPos
ole32
CoGetMalloc
Sections
.text Size: 4.1MB - Virtual size: 4.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 31KB - Virtual size: 4.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ