Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_6d8dcebefa7a5e6a1b2f561a744f6f6a94ded18523454b4d06ae2a9937a49cee.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_6d8dcebefa7a5e6a1b2f561a744f6f6a94ded18523454b4d06ae2a9937a49cee.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_6d8dcebefa7a5e6a1b2f561a744f6f6a94ded18523454b4d06ae2a9937a49cee
-
Size
4.2MB
-
MD5
01a2674eba26a9b2481a8e37d3b8263e
-
SHA1
22a5a939f1c8a544ce77f390ec57d91e5ee579ac
-
SHA256
6d8dcebefa7a5e6a1b2f561a744f6f6a94ded18523454b4d06ae2a9937a49cee
-
SHA512
c1ce220baa1256b279678493f52c1937dabee72625fe2c25612baa9a5cd776d77aeb0650eae86e4aae1c43e41b99f36aa79736630235bde1440ceac62f02637c
-
SSDEEP
98304:Ch7awcOWj4d/OsyQRzUhUJ4CnVnO0LenMGB9eEtbjc/XMbU:e7avOa8RIhUJTO0LenMGf+/XMbU
Malware Config
Signatures
Files
-
JaffaCakes118_6d8dcebefa7a5e6a1b2f561a744f6f6a94ded18523454b4d06ae2a9937a49cee.exe windows:5 windows x86 arch:x86
24643f0ee26dc38e8dd12b471523f8fa
Code Sign
26:27:17:72:d9:87:a0:60:fa:82:ff:4c:c7:c8:89:9aCertificate
IssuerPOSTALCODE=10305Not Before17-11-2021 16:19Not After17-11-2022 16:19SubjectPOSTALCODE=1030556:6c:1a:d4:64:cb:62:91:d6:6a:d7:9d:28:47:9c:8e:f1:86:dc:1e:72:68:ed:82:80:df:64:a6:a1:13:05:21Signer
Actual PE Digest56:6c:1a:d4:64:cb:62:91:d6:6a:d7:9d:28:47:9c:8e:f1:86:dc:1e:72:68:ed:82:80:df:64:a6:a1:13:05:21Digest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
C:\zeked bucemosak.pdb
Imports
kernel32
GetSystemDefaultLangID
HeapCompact
LoadResource
GlobalAddAtomA
GetEnvironmentStringsW
WaitForSingleObject
CreateHardLinkA
GetConsoleAliasesA
GetConsoleAliasesLengthA
GetSystemTimeAsFileTime
CancelDeviceWakeupRequest
EnumResourceTypesA
GetFirmwareEnvironmentVariableA
InitializeCriticalSectionAndSpinCount
ReadFileScatter
InitAtomTable
SetConsoleCP
GetFileAttributesA
SetConsoleCursorPosition
GetAtomNameW
FlushFileBuffers
SetLastError
GetProcAddress
VirtualAlloc
LoadLibraryA
LocalAlloc
WaitForMultipleObjects
GetDefaultCommConfigA
GetConsoleTitleW
EnumDateFormatsW
CloseHandle
DeleteAtom
CheckRemoteDebuggerPresent
EnumCalendarInfoExA
LCMapStringW
AreFileApisANSI
CreateFileW
HeapAlloc
EncodePointer
DecodePointer
GetCommandLineW
HeapSetInformation
GetStartupInfoW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
GetCurrentProcess
GetLastError
HeapFree
GetModuleHandleW
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameW
HeapCreate
Sleep
HeapSize
SetHandleCount
GetFileType
DeleteCriticalSection
SetFilePointer
EnterCriticalSection
LeaveCriticalSection
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
GetCurrentThreadId
InterlockedDecrement
FreeEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
LoadLibraryW
HeapReAlloc
RtlUnwind
SetStdHandle
WriteConsoleW
MultiByteToWideChar
GetStringTypeW
IsProcessorFeaturePresent
user32
DestroyCaret
Sections
.text Size: 4.1MB - Virtual size: 4.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 4.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ