Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_82143c832d05331b7c1f251104a34a2cb58992d72ebc7c2c6ff07311a30f7f3e.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
JaffaCakes118_82143c832d05331b7c1f251104a34a2cb58992d72ebc7c2c6ff07311a30f7f3e.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_82143c832d05331b7c1f251104a34a2cb58992d72ebc7c2c6ff07311a30f7f3e
-
Size
4.2MB
-
MD5
aa3de71907cec57fcbd6dbe9f5299532
-
SHA1
e13e03b0036f95f44c2484432937e669d43ae9c5
-
SHA256
82143c832d05331b7c1f251104a34a2cb58992d72ebc7c2c6ff07311a30f7f3e
-
SHA512
eacb736c25f72284d0a28de5466134cf7ab56fb8be5a25cc49af92edbdd59fa5f090a38ab904933df85f355a6f19dd340ac0cd6963175409210da4896b5bdef7
-
SSDEEP
98304:YYqBC8vEbgwsE946rEnJdbcvg89xP0YcaBnD7cS0Acl4Iwjpnm9N4Ii2NWEk0:kT9ENrEHcvN7DLqC7cRrNWEk0
Malware Config
Signatures
Files
-
JaffaCakes118_82143c832d05331b7c1f251104a34a2cb58992d72ebc7c2c6ff07311a30f7f3e.exe windows:5 windows x86 arch:x86
804abf6bfd1eb86d699699dd471c7b89
Code Sign
18:df:83:40:62:c8:da:da:bc:53:40:4e:d6:de:93:5bCertificate
IssuerPOSTALCODE=10301Not Before15-11-2021 01:50Not After15-11-2022 01:50SubjectPOSTALCODE=1030172:95:7f:cc:f0:04:2e:05:40:fb:43:19:dd:6a:ea:e1:6b:8a:1a:98:bc:8f:20:e4:69:b4:fa:4d:18:0c:1a:49Signer
Actual PE Digest72:95:7f:cc:f0:04:2e:05:40:fb:43:19:dd:6a:ea:e1:6b:8a:1a:98:bc:8f:20:e4:69:b4:fa:4d:18:0c:1a:49Digest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
C:\hetesucepadux72 redixit x.pdb
Imports
kernel32
GetEnvironmentStringsW
GetTickCount
GetConsoleAliasesA
GetSystemTimeAsFileTime
ReadConsoleW
WriteFileGather
SetHandleCount
GlobalAlloc
InitializeCriticalSectionAndSpinCount
Sleep
GetProcessHandleCount
GetSystemWindowsDirectoryA
SetConsoleCP
DeleteVolumeMountPointW
FindNextVolumeW
SetConsoleCursorPosition
GetAtomNameW
GetCPInfoExW
SetLastError
GetProcAddress
VirtualAlloc
BeginUpdateResourceW
EnumDateFormatsExA
GetFirmwareEnvironmentVariableW
LoadLibraryA
WriteConsoleA
UnhandledExceptionFilter
CreateHardLinkW
GetDefaultCommConfigA
SetConsoleCursorInfo
IsDebuggerPresent
RequestDeviceWakeup
QueryPerformanceFrequency
DuplicateHandle
DeleteAtom
lstrcpyW
SetCriticalSectionSpinCount
LCMapStringA
HeapAlloc
GetModuleHandleW
ExitProcess
DecodePointer
GetCommandLineW
HeapSetInformation
GetStartupInfoW
EnterCriticalSection
LeaveCriticalSection
GetStdHandle
GetFileType
DeleteCriticalSection
SetUnhandledExceptionFilter
EncodePointer
TerminateProcess
GetCurrentProcess
WriteFile
GetModuleFileNameW
HeapCreate
IsProcessorFeaturePresent
GetLastError
SetFilePointer
HeapFree
CloseHandle
LoadLibraryW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
GetCurrentThreadId
InterlockedDecrement
FreeEnvironmentStringsW
QueryPerformanceCounter
GetCurrentProcessId
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
RtlUnwind
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
RaiseException
SetStdHandle
FlushFileBuffers
HeapSize
HeapReAlloc
WriteConsoleW
MultiByteToWideChar
LCMapStringW
GetStringTypeW
CreateFileW
user32
GetClipCursor
advapi32
AdjustTokenPrivileges
Sections
.text Size: 4.1MB - Virtual size: 4.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 15KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 110KB - Virtual size: 4.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ