Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_3b475c8b297eec30f670f1734b12663944d632e11cd8b643922948e4047cc354.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
JaffaCakes118_3b475c8b297eec30f670f1734b12663944d632e11cd8b643922948e4047cc354.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_3b475c8b297eec30f670f1734b12663944d632e11cd8b643922948e4047cc354
-
Size
4.0MB
-
MD5
472b12103c301bfe96305040e9c54c35
-
SHA1
4ae380e48dabfac144a7990ac72cdb429d34d9a5
-
SHA256
3b475c8b297eec30f670f1734b12663944d632e11cd8b643922948e4047cc354
-
SHA512
657d6d479b10cfed64a8101cb5009045fa1638498b3c0bf99df6e2ec818db5cb1b0b2574350da484e5d19377aba2a75b96c8a404d01e9aee50ca692a6a89d7ca
-
SSDEEP
98304:hil9XQZsDDRqPIPBHOMER93z9upwuZDHPE3fGAoutyNom7Rv:hS9XDDc4ur5SwuBHMeA4Nomv
Malware Config
Signatures
Files
-
JaffaCakes118_3b475c8b297eec30f670f1734b12663944d632e11cd8b643922948e4047cc354.exe windows:5 windows x86 arch:x86
838f718910cdf3a4ebf0855233529379
Code Sign
fa:62:6b:4f:0d:ae:ca:2c:24:00:b8:e1:98:37:0e:9aCertificate
IssuerPOSTALCODE=10305Not Before26-09-2022 23:01Not After26-09-2023 23:01SubjectPOSTALCODE=103053c:c0:f2:b7:bb:75:79:69:7e:3b:12:34:5b:b6:68:83:77:65:0e:f1:59:20:fb:19:7e:78:c7:bd:26:63:19:14Signer
Actual PE Digest3c:c0:f2:b7:bb:75:79:69:7e:3b:12:34:5b:b6:68:83:77:65:0e:f1:59:20:fb:19:7e:78:c7:bd:26:63:19:14Digest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
C:\cirigehesazeg85\fahawocuzitinu-sehe\xunogedo.pdb
Imports
kernel32
LocalShrink
InterlockedExchange
GetSystemTimeAdjustment
SetLocaleInfoW
FindNextVolumeW
FindNextChangeNotification
CopyFileExA
MoveFileWithProgressW
GetProfileSectionW
VerifyVersionInfoA
LocalSize
FileTimeToDosDateTime
FindFirstChangeNotificationW
GlobalGetAtomNameA
FindResourceExA
GetComputerNameExA
GetModuleHandleW
GetTempPathW
BuildCommDCBAndTimeoutsW
GetProcAddress
LoadLibraryA
GetFileTime
SetConsoleScreenBufferSize
VirtualLock
GetPrivateProfileStructA
GetWindowsDirectoryW
GetCPInfoExA
PostQueuedCompletionStatus
GlobalFindAtomA
TerminateJobObject
lstrcpynA
WriteConsoleA
GetBinaryTypeA
GetLastError
SearchPathW
GetCommandLineW
InterlockedIncrement
GetCalendarInfoA
GetConsoleTitleA
CreateActCtxW
FormatMessageW
GetConsoleAliasA
OpenWaitableTimerA
GetModuleHandleA
LoadLibraryW
TerminateProcess
GetSystemDirectoryW
EnterCriticalSection
EnumSystemLocalesA
GetStringTypeExW
OpenMutexW
TransactNamedPipe
SearchPathA
FindResourceW
GetProcessTimes
GetOverlappedResult
GetPrivateProfileStructW
DeleteFiber
InterlockedExchangeAdd
EnumDateFormatsA
InterlockedDecrement
FindActCtxSectionStringW
SetConsoleCursorPosition
RegisterWaitForSingleObject
GlobalAlloc
QueryMemoryResourceNotification
SetLastError
GetProcessPriorityBoost
GetMailslotInfo
SetFilePointer
GetConsoleMode
HeapReAlloc
HeapAlloc
DeleteFileA
GetCommandLineA
GetStartupInfoA
DeleteCriticalSection
LeaveCriticalSection
HeapCreate
VirtualFree
HeapFree
VirtualAlloc
SetUnhandledExceptionFilter
Sleep
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
GetCurrentThreadId
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetCurrentProcess
UnhandledExceptionFilter
IsDebuggerPresent
InitializeCriticalSectionAndSpinCount
RtlUnwind
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
HeapSize
GetLocaleInfoA
LCMapStringA
MultiByteToWideChar
LCMapStringW
GetStringTypeA
GetStringTypeW
user32
CharUpperW
Sections
.text Size: 45KB - Virtual size: 44KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 3.9MB - Virtual size: 5.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 3.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ