Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_01b0dab05f5b4e0d35e69045e2a2413eaf73b13303e8e6026dcaf5a6b90b24e8.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_01b0dab05f5b4e0d35e69045e2a2413eaf73b13303e8e6026dcaf5a6b90b24e8.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_01b0dab05f5b4e0d35e69045e2a2413eaf73b13303e8e6026dcaf5a6b90b24e8
-
Size
4.4MB
-
MD5
68b20c0103acda49dcb976af5caee9d9
-
SHA1
b1f830da730fb46d076cfd486e85216f056c0ba0
-
SHA256
01b0dab05f5b4e0d35e69045e2a2413eaf73b13303e8e6026dcaf5a6b90b24e8
-
SHA512
3a50c7f80dd347b66dbf6edc0c2f36f9d01fbfd6985ea97e0104533993b227232d71f34baa0addb9455fb1aca2887e286ce163856e9be58fd198d2042d3f406c
-
SSDEEP
98304:zv6v+tsX5TGnekDJAF7c7bLDURneHv74f3KY7:Ov+ckeGUcHvv7cKY7
Malware Config
Signatures
Files
-
JaffaCakes118_01b0dab05f5b4e0d35e69045e2a2413eaf73b13303e8e6026dcaf5a6b90b24e8.exe windows:5 windows x86 arch:x86
400fbb4d0298c92dcf0f4177f613bae0
Code Sign
e0:80:f3:42:26:12:ac:9e:8e:39:80:12:f0:3d:5e:21Certificate
IssuerPOSTALCODE=10051Not Before04-09-2021 18:00Not After04-09-2022 18:00SubjectPOSTALCODE=1005104:e6:f7:ec:76:66:7e:e3:f2:8e:37:c2:d6:d8:a3:cf:4e:48:d1:9e:24:6d:f6:3d:47:c7:89:cf:1b:d9:83:b9Signer
Actual PE Digest04:e6:f7:ec:76:66:7e:e3:f2:8e:37:c2:d6:d8:a3:cf:4e:48:d1:9e:24:6d:f6:3d:47:c7:89:cf:1b:d9:83:b9Digest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
C:\talifa\72\diho.pdb
Imports
kernel32
FileTimeToDosDateTime
GetNativeSystemInfo
lstrlenA
CopyFileExW
GetStringTypeA
GetCPInfo
InterlockedIncrement
ReadConsoleA
InterlockedDecrement
CompareFileTime
GlobalLock
FreeEnvironmentStringsA
GetModuleHandleW
GetCurrentThread
GetSystemTimeAsFileTime
WriteFile
SetCommState
GetCommandLineA
GlobalAlloc
GetPrivateProfileIntA
LoadLibraryW
CopyFileW
GetSystemWindowsDirectoryA
GetConsoleAliasExesLengthW
GetVersionExW
GlobalFlags
TerminateProcess
ReadFile
SetThreadPriority
GetNamedPipeHandleStateW
LCMapStringA
GetPrivateProfileIntW
CreateDirectoryA
GetStartupInfoA
SetThreadLocale
GetLastError
GetProcAddress
GetPrivateProfileStringA
OpenWaitableTimerA
LoadLibraryA
Process32FirstW
GetFileType
SetCurrentDirectoryW
SetThreadIdealProcessor
HeapWalk
FindAtomA
CreateIoCompletionPort
QueryMemoryResourceNotification
EnumResourceNamesA
GetCPInfoExA
TlsAlloc
ReadConsoleOutputCharacterW
GetSystemTime
DeleteFileA
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
MultiByteToWideChar
GetStartupInfoW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetModuleFileNameW
HeapValidate
IsBadReadPtr
RaiseException
RtlUnwind
GetCurrentProcess
IsDebuggerPresent
GetACP
GetOEMCP
IsValidCodePage
TlsGetValue
TlsSetValue
GetCurrentThreadId
TlsFree
SetLastError
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
ExitProcess
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetStdHandle
HeapDestroy
HeapCreate
HeapFree
VirtualFree
GetModuleFileNameA
FlushFileBuffers
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
DebugBreak
OutputDebugStringA
WriteConsoleW
OutputDebugStringW
HeapAlloc
HeapSize
HeapReAlloc
VirtualAlloc
InitializeCriticalSectionAndSpinCount
LCMapStringW
GetStringTypeW
GetLocaleInfoA
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
SetFilePointer
CloseHandle
CreateFileA
user32
GetComboBoxInfo
msimg32
TransparentBlt
Sections
.text Size: 115KB - Virtual size: 115KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 35KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4.2MB - Virtual size: 43.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 15KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ