Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_11db13db731eae7d395bbc74a530b8e6b43f27c4f0361017b5ea1768aebd3339.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
JaffaCakes118_11db13db731eae7d395bbc74a530b8e6b43f27c4f0361017b5ea1768aebd3339.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_11db13db731eae7d395bbc74a530b8e6b43f27c4f0361017b5ea1768aebd3339
-
Size
4.2MB
-
MD5
86cb740f233fda0c2e4e456f482af253
-
SHA1
d79e84be26a1e73da268a680c689f03fdb51ebba
-
SHA256
11db13db731eae7d395bbc74a530b8e6b43f27c4f0361017b5ea1768aebd3339
-
SHA512
6111ad667af88047a943bafdbf336fa6870e4fe6b5c8b5eef65f2af71172d7be4402280a04a986fc0d4c876b99dca11b6fa457b116d40aa740a34f81b0a36b5e
-
SSDEEP
98304:rdwOET3LvsHmmUnxxyWBlX+PBEquxYlUxghsk:zE/vsAxtjsBvh
Malware Config
Signatures
Files
-
JaffaCakes118_11db13db731eae7d395bbc74a530b8e6b43f27c4f0361017b5ea1768aebd3339.exe windows:5 windows x86 arch:x86
afba3b8b31c67dace4c6040b0c533a33
Code Sign
1c:71:81:ba:7d:68:07:3c:7b:c5:74:98:63:51:51:92Certificate
IssuerPOSTALCODE=10305Not Before17-11-2021 15:33Not After17-11-2022 15:33SubjectPOSTALCODE=1030506:ae:b2:83:1e:e6:54:e5:8e:00:34:f2:ac:c3:40:44:09:4a:49:31:33:93:19:c5:b7:56:20:3e:ee:6f:cc:93Signer
Actual PE Digest06:ae:b2:83:1e:e6:54:e5:8e:00:34:f2:ac:c3:40:44:09:4a:49:31:33:93:19:c5:b7:56:20:3e:ee:6f:cc:93Digest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
C:\pehulodove\xosodiwab xebaxipivobo\ruma.pdb
Imports
kernel32
LoadResource
GetEnvironmentStringsW
WaitForSingleObject
GetProcessHeap
GetConsoleAliasesA
GetConsoleAliasesLengthA
GetSystemTimeAsFileTime
CancelDeviceWakeupRequest
EnumResourceTypesA
GlobalAlloc
GetFirmwareEnvironmentVariableA
InitializeCriticalSectionAndSpinCount
ReadFileScatter
InitAtomTable
SetConsoleCP
GetFileAttributesA
SetConsoleCursorPosition
FlushFileBuffers
SetLastError
GetProcAddress
VirtualAlloc
LoadLibraryA
CreateHardLinkW
WaitForMultipleObjects
GetDefaultCommConfigA
GetConsoleTitleW
EnumDateFormatsW
CloseHandle
DeleteAtom
GlobalAddAtomW
CheckRemoteDebuggerPresent
EnumCalendarInfoExA
LCMapStringW
GetAtomNameW
GetSystemDefaultLangID
CreateFileW
HeapAlloc
EncodePointer
DecodePointer
GetCommandLineW
HeapSetInformation
GetStartupInfoW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
GetCurrentProcess
GetLastError
HeapFree
GetModuleHandleW
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameW
HeapCreate
Sleep
HeapSize
SetHandleCount
GetFileType
DeleteCriticalSection
SetFilePointer
EnterCriticalSection
LeaveCriticalSection
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
GetCurrentThreadId
InterlockedDecrement
FreeEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
LoadLibraryW
HeapReAlloc
RtlUnwind
SetStdHandle
WriteConsoleW
MultiByteToWideChar
GetStringTypeW
IsProcessorFeaturePresent
user32
DestroyCaret
advapi32
CloseEventLog
Sections
.text Size: 4.1MB - Virtual size: 4.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 4.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ