Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_bbda48e4db0aea0de0a4efffe93392ccb20b015ef04a00a6d1765a262c04577d.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_bbda48e4db0aea0de0a4efffe93392ccb20b015ef04a00a6d1765a262c04577d.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_bbda48e4db0aea0de0a4efffe93392ccb20b015ef04a00a6d1765a262c04577d
-
Size
4.3MB
-
MD5
a45ca938d8ccc2505c073aedcf1d6a79
-
SHA1
bc90d1c41a504fa3e4d504d794ea151dd8762c7b
-
SHA256
bbda48e4db0aea0de0a4efffe93392ccb20b015ef04a00a6d1765a262c04577d
-
SHA512
9fe251d689244ae2dbef0276463e0ca31e5c24ce4e618ca057b250cbd09cbc665c13d7084660b700fcdc7e1fc907aa3ee6f96b41c6bc8ac92b3e8a8d385ca3da
-
SSDEEP
98304:3J5FciXbuiiue0HLBcyW+Cc/tLpon1cmMBVUTd3/L8PTTNxgYw:3zbuhELBcH9yy1ca3z0xw
Malware Config
Signatures
Files
-
JaffaCakes118_bbda48e4db0aea0de0a4efffe93392ccb20b015ef04a00a6d1765a262c04577d.exe windows:5 windows x86 arch:x86
2aa979ef3cea65356d0640f20de6e03d
Code Sign
6c:da:60:a9:63:81:c6:d3:31:e6:5f:9a:70:44:76:d6Certificate
IssuerPOSTALCODE=10301Not Before16-11-2021 04:20Not After16-11-2022 04:20SubjectPOSTALCODE=103014d:99:b2:56:f2:00:64:f5:70:a6:6b:d8:55:94:fd:0c:10:aa:1c:1e:9e:f7:2d:0b:b8:ba:62:f2:fe:38:68:efSigner
Actual PE Digest4d:99:b2:56:f2:00:64:f5:70:a6:6b:d8:55:94:fd:0c:10:aa:1c:1e:9e:f7:2d:0b:b8:ba:62:f2:fe:38:68:efDigest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
C:\losibo\lubalas_tohuyab-ke.pdb
Imports
kernel32
InterlockedIncrement
_lwrite
GetSystemWindowsDirectoryW
GetNamedPipeHandleStateA
GetComputerNameW
FreeEnvironmentStringsA
GetTickCount
CreateNamedPipeW
GetProcessHeap
ConvertFiberToThread
GetSystemTimeAsFileTime
GetPrivateProfileStringW
GetWindowsDirectoryA
GetSystemWow64DirectoryA
QueryActCtxW
CreateActCtxW
GetSystemTimes
GetDriveTypeA
TlsSetValue
GetConsoleMode
GetVersionExW
HeapCreate
HeapValidate
GetVolumePathNamesForVolumeNameW
IsDBCSLeadByte
GetModuleFileNameW
CompareStringW
GetStartupInfoW
VerifyVersionInfoW
FindFirstFileExA
GetHandleInformation
GetLastError
SetDllDirectoryW
GetProcAddress
GetLongPathNameA
SetFirmwareEnvironmentVariableW
CopyFileA
GetConsoleDisplayMode
FindClose
LoadLibraryA
LocalAlloc
IsWow64Process
WritePrivateProfileStringA
IsSystemResumeAutomatic
SetCurrentDirectoryW
SetFileApisToANSI
QueryDosDeviceW
GetModuleFileNameA
GetOEMCP
GetModuleHandleA
GetProcessShutdownParameters
CreateWaitableTimerW
FreeEnvironmentStringsW
WriteProfileStringW
RequestWakeupLatency
BuildCommDCBA
GetConsoleCursorInfo
ReadConsoleInputW
TlsAlloc
FileTimeToLocalFileTime
CloseHandle
CreateFileW
FlushFileBuffers
CommConfigDialogA
SetWaitableTimer
GetConsoleAliasesLengthW
SetLastError
lstrlenA
DeleteFileA
GetCommandLineA
HeapSetInformation
SetUnhandledExceptionFilter
QueryPerformanceCounter
GetCurrentThreadId
GetCurrentProcessId
InterlockedDecrement
DecodePointer
GetModuleHandleW
ExitProcess
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
IsBadReadPtr
EncodePointer
TlsGetValue
TlsFree
WriteFile
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
IsDebuggerPresent
GetACP
GetCPInfo
IsValidCodePage
EnterCriticalSection
LeaveCriticalSection
LoadLibraryW
HeapAlloc
HeapReAlloc
HeapSize
HeapQueryInformation
HeapFree
RtlUnwind
RaiseException
OutputDebugStringA
WriteConsoleW
OutputDebugStringW
LCMapStringW
MultiByteToWideChar
GetStringTypeW
IsProcessorFeaturePresent
SetFilePointer
GetConsoleCP
SetStdHandle
user32
GetCaretBlinkTime
GetComboBoxInfo
gdi32
GetBitmapBits
advapi32
SetKernelObjectSecurity
AbortSystemShutdownW
Sections
.text Size: 4.2MB - Virtual size: 4.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 35.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 23KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 70KB - Virtual size: 70KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ