Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_c215d76526bda2129d419519be4cba97ae5dd2d10a1fcf5831517397d09854c3.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_c215d76526bda2129d419519be4cba97ae5dd2d10a1fcf5831517397d09854c3.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_c215d76526bda2129d419519be4cba97ae5dd2d10a1fcf5831517397d09854c3
-
Size
4.4MB
-
MD5
d22b0f66a17f6f36c556ad0ba58f67c5
-
SHA1
0a546f4d710bb9f5cac9e809ac330da3444d5e3a
-
SHA256
c215d76526bda2129d419519be4cba97ae5dd2d10a1fcf5831517397d09854c3
-
SHA512
0661fc386ccd6be430740484b587a0d59bb5872897914c1725c968d2b278e1855bfd53517d0288340b013ec3db9e825a3c45d856b208a882a7b3aeb3db03cec3
-
SSDEEP
98304:o4+8FLHnk2DwvU7/rcnub10nXmLzcYWoKZiwzR0a:o4DLE2DWUPcuh0nXmvlszRt
Malware Config
Signatures
Files
-
JaffaCakes118_c215d76526bda2129d419519be4cba97ae5dd2d10a1fcf5831517397d09854c3.exe windows:5 windows x86 arch:x86
f530acf7acd4a5c8880ba2a4704d4cbb
Code Sign
fc:e5:aa:02:a3:72:6d:7c:39:b0:c6:d4:b7:d4:c5:d7Certificate
IssuerPOSTALCODE=10051Not Before05-09-2021 03:33Not After05-09-2022 03:33SubjectPOSTALCODE=1005116:53:8a:46:7a:a8:10:7e:ae:71:18:3f:51:b0:32:eb:50:4b:86:d6:82:16:a4:bd:05:54:96:43:79:9d:8e:6dSigner
Actual PE Digest16:53:8a:46:7a:a8:10:7e:ae:71:18:3f:51:b0:32:eb:50:4b:86:d6:82:16:a4:bd:05:54:96:43:79:9d:8e:6dDigest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
C:\tiwasijom\dofasar.pdb
Imports
kernel32
lstrcpynA
GetDefaultCommConfigW
ReadConsoleA
InterlockedDecrement
SetEnvironmentVariableW
GetEnvironmentStringsW
GetUserDefaultLCID
SetVolumeMountPointW
GetSystemDefaultLCID
EnumCalendarInfoExW
InitializeCriticalSectionAndSpinCount
GetSystemWindowsDirectoryA
LeaveCriticalSection
GetComputerNameExA
ReadFile
GetModuleFileNameW
GetACP
LCMapStringA
VerifyVersionInfoW
InterlockedExchange
GetProcAddress
PeekConsoleInputW
VerLanguageNameA
CopyFileA
GetLocalTime
WriteConsoleA
LocalAlloc
SetConsoleOutputCP
Module32FirstW
GetModuleFileNameA
GetModuleHandleA
QueueUserWorkItem
GetConsoleTitleW
PeekConsoleInputA
ReadConsoleInputW
GetCurrentProcessId
AddConsoleAliasA
FindNextVolumeA
PulseEvent
GetCommandLineW
GetStartupInfoW
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetModuleHandleW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
GetLastError
Sleep
HeapSize
ExitProcess
EnterCriticalSection
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
SetFilePointer
WriteFile
FreeEnvironmentStringsW
HeapCreate
VirtualFree
HeapFree
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
GetCPInfo
GetOEMCP
IsValidCodePage
RaiseException
HeapAlloc
HeapReAlloc
VirtualAlloc
LoadLibraryA
RtlUnwind
SetStdHandle
FlushFileBuffers
GetConsoleOutputCP
WriteConsoleW
MultiByteToWideChar
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
CreateFileA
CloseHandle
gdi32
GetCharWidthFloatW
Sections
.text Size: 4.3MB - Virtual size: 4.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 29.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 123KB - Virtual size: 122KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ