Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_7d0846573b449454af30d43471c7f143981a5f85c7efabedccd1bbd6f832cdb5.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
JaffaCakes118_7d0846573b449454af30d43471c7f143981a5f85c7efabedccd1bbd6f832cdb5.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_7d0846573b449454af30d43471c7f143981a5f85c7efabedccd1bbd6f832cdb5
-
Size
4.2MB
-
MD5
8d929c4c0418a9765d9dffacbf36c9eb
-
SHA1
4bda4686f61762376ea15132333c4500fd86ef1b
-
SHA256
7d0846573b449454af30d43471c7f143981a5f85c7efabedccd1bbd6f832cdb5
-
SHA512
e0c5aa088c88b702ac1ac20247a7b9543370020465e3a50320089182c6878efa0776f0a73f93f351df6abc8d5faa13b372a17e2bc37ea9136771688c7775ee65
-
SSDEEP
98304:rdwOET3LvsHmmUnxxyWBlX+PBEquxYlUxghs3:zE/vsAxtjsBve
Malware Config
Signatures
Files
-
JaffaCakes118_7d0846573b449454af30d43471c7f143981a5f85c7efabedccd1bbd6f832cdb5.exe windows:5 windows x86 arch:x86
afba3b8b31c67dace4c6040b0c533a33
Code Sign
48:be:d3:fe:33:a3:d9:6a:73:bd:47:27:f3:29:8d:63Certificate
IssuerPOSTALCODE=10301Not Before17-11-2021 15:37Not After17-11-2022 15:37SubjectPOSTALCODE=1030106:ae:b2:83:1e:e6:54:e5:8e:00:34:f2:ac:c3:40:44:09:4a:49:31:33:93:19:c5:b7:56:20:3e:ee:6f:cc:93Signer
Actual PE Digest06:ae:b2:83:1e:e6:54:e5:8e:00:34:f2:ac:c3:40:44:09:4a:49:31:33:93:19:c5:b7:56:20:3e:ee:6f:cc:93Digest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
C:\pehulodove\xosodiwab xebaxipivobo\ruma.pdb
Imports
kernel32
LoadResource
GetEnvironmentStringsW
WaitForSingleObject
GetProcessHeap
GetConsoleAliasesA
GetConsoleAliasesLengthA
GetSystemTimeAsFileTime
CancelDeviceWakeupRequest
EnumResourceTypesA
GlobalAlloc
GetFirmwareEnvironmentVariableA
InitializeCriticalSectionAndSpinCount
ReadFileScatter
InitAtomTable
SetConsoleCP
GetFileAttributesA
SetConsoleCursorPosition
FlushFileBuffers
SetLastError
GetProcAddress
VirtualAlloc
LoadLibraryA
CreateHardLinkW
WaitForMultipleObjects
GetDefaultCommConfigA
GetConsoleTitleW
EnumDateFormatsW
CloseHandle
DeleteAtom
GlobalAddAtomW
CheckRemoteDebuggerPresent
EnumCalendarInfoExA
LCMapStringW
GetAtomNameW
GetSystemDefaultLangID
CreateFileW
HeapAlloc
EncodePointer
DecodePointer
GetCommandLineW
HeapSetInformation
GetStartupInfoW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
GetCurrentProcess
GetLastError
HeapFree
GetModuleHandleW
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameW
HeapCreate
Sleep
HeapSize
SetHandleCount
GetFileType
DeleteCriticalSection
SetFilePointer
EnterCriticalSection
LeaveCriticalSection
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
GetCurrentThreadId
InterlockedDecrement
FreeEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
LoadLibraryW
HeapReAlloc
RtlUnwind
SetStdHandle
WriteConsoleW
MultiByteToWideChar
GetStringTypeW
IsProcessorFeaturePresent
user32
DestroyCaret
advapi32
CloseEventLog
Sections
.text Size: 4.1MB - Virtual size: 4.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 4.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ