Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_6afa57c80b15c27d01d08981f67fdc1a050daa34c87ce2c6d93533b8ff6eec4c.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_6afa57c80b15c27d01d08981f67fdc1a050daa34c87ce2c6d93533b8ff6eec4c.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_6afa57c80b15c27d01d08981f67fdc1a050daa34c87ce2c6d93533b8ff6eec4c
-
Size
4.2MB
-
MD5
6947aa744dc7d25e86abb43e1812fa70
-
SHA1
604d5b83ff7178ff814ac46b77b1f4b33ef75eb0
-
SHA256
6afa57c80b15c27d01d08981f67fdc1a050daa34c87ce2c6d93533b8ff6eec4c
-
SHA512
66591e1a42e6b02eb5717252455f4667b5bba461d96d78559d747da6e3fbe62d2093daac7139138430b793bfbfcd5c54ae7a0b783b65df27232ba42dae693ae4
-
SSDEEP
98304:pZ9vd8bJIGsQLXxIRMta3aYcCWJUzBtYTHATGXn:pd8bJIGsShIyta3aLPJ0t8gsn
Malware Config
Signatures
Files
-
JaffaCakes118_6afa57c80b15c27d01d08981f67fdc1a050daa34c87ce2c6d93533b8ff6eec4c.exe windows:5 windows x86 arch:x86
9510c947cc2282bdda1a9b4a47d8d006
Code Sign
0f:c9:59:09:04:77:2a:89:dd:23:82:ba:ae:34:87:8fCertificate
IssuerPOSTALCODE=10301Not Before14-11-2021 17:46Not After14-11-2022 17:46SubjectPOSTALCODE=10301d8:53:26:14:04:6f:98:ce:d4:e5:a5:be:83:a4:1f:45:9e:c7:20:26:90:9a:91:a6:a5:83:18:a7:02:f0:cd:c4Signer
Actual PE Digestd8:53:26:14:04:6f:98:ce:d4:e5:a5:be:83:a4:1f:45:9e:c7:20:26:90:9a:91:a6:a5:83:18:a7:02:f0:cd:c4Digest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
C:\boyohik\pawo_howazuvuwaw\fofimijir\jecovut\76\bowodeto-r.pdb
Imports
kernel32
GetCurrentActCtx
GetEnvironmentStringsW
GetSystemDefaultLCID
GetTickCount
GetSystemTimeAsFileTime
ReadConsoleW
WriteFileGather
SetHandleCount
GlobalAlloc
InitializeCriticalSectionAndSpinCount
Sleep
GetProcessHandleCount
GetSystemWindowsDirectoryA
SetConsoleCP
DeleteVolumeMountPointW
FindNextVolumeW
SetConsoleCursorPosition
LCMapStringA
GetCPInfoExW
SetLastError
GetProcAddress
VirtualAlloc
BeginUpdateResourceW
EnumDateFormatsExA
GetFirmwareEnvironmentVariableW
EnterCriticalSection
VirtualAllocEx
LoadLibraryA
WriteConsoleA
GetDefaultCommConfigA
SetConsoleCursorInfo
RequestDeviceWakeup
QueryPerformanceFrequency
DuplicateHandle
DeleteAtom
lstrcpyW
GetAtomNameW
SetCriticalSectionSpinCount
HeapAlloc
GetModuleHandleW
ExitProcess
DecodePointer
GetCommandLineW
HeapSetInformation
GetStartupInfoW
LeaveCriticalSection
GetStdHandle
GetFileType
DeleteCriticalSection
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EncodePointer
TerminateProcess
GetCurrentProcess
WriteFile
GetModuleFileNameW
HeapCreate
IsProcessorFeaturePresent
GetLastError
SetFilePointer
HeapFree
CloseHandle
LoadLibraryW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
GetCurrentThreadId
InterlockedDecrement
FreeEnvironmentStringsW
QueryPerformanceCounter
GetCurrentProcessId
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
RtlUnwind
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
RaiseException
SetStdHandle
FlushFileBuffers
HeapSize
HeapReAlloc
WriteConsoleW
MultiByteToWideChar
LCMapStringW
GetStringTypeW
CreateFileW
user32
GetClipCursor
advapi32
AdjustTokenPrivileges
Sections
.text Size: 4.1MB - Virtual size: 4.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 15KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 110KB - Virtual size: 4.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ