Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_e30b11b3b01ea7590ed4500eb06ef6997c2cfc28918f3eec0c3cb27c214a845d.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
JaffaCakes118_e30b11b3b01ea7590ed4500eb06ef6997c2cfc28918f3eec0c3cb27c214a845d.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_e30b11b3b01ea7590ed4500eb06ef6997c2cfc28918f3eec0c3cb27c214a845d
-
Size
4.4MB
-
MD5
6ecc84317f0d51ca1e135a4aabfead68
-
SHA1
d7d03964e230c1cd4dcd6c48686aece3815cbf59
-
SHA256
e30b11b3b01ea7590ed4500eb06ef6997c2cfc28918f3eec0c3cb27c214a845d
-
SHA512
21e40144000ac299a04d0a9ef02e2cb1500fdaa27cb8201430e893de0e6d4bf68c691d4fcbb86e7eb1f9ccd756f5b102b30cbca90966823b49147d600ccfdc10
-
SSDEEP
98304:b2YxP6dtbes7vYouQtUJWMpN1TvNGw7SfWeiRy/L4BNOWO:b2Yxydt5uLRprTTSfWtc
Malware Config
Signatures
Files
-
JaffaCakes118_e30b11b3b01ea7590ed4500eb06ef6997c2cfc28918f3eec0c3cb27c214a845d.exe windows:5 windows x86 arch:x86
b96546bb8656e94382ad7dab68551d5e
Code Sign
5b:e7:35:76:55:2a:30:31:52:49:5f:c9:cb:32:0d:33Certificate
IssuerPOSTALCODE=10051Not Before07-09-2021 11:51Not After07-09-2022 11:51SubjectPOSTALCODE=10051d0:67:62:67:9d:f7:87:97:05:a1:32:e9:65:17:5c:7e:9f:0f:07:43:04:da:da:20:15:bd:30:c0:26:d9:f9:55Signer
Actual PE Digestd0:67:62:67:9d:f7:87:97:05:a1:32:e9:65:17:5c:7e:9f:0f:07:43:04:da:da:20:15:bd:30:c0:26:d9:f9:55Digest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
C:\yubayasew-fa.pdb
Imports
kernel32
DosDateTimeToFileTime
FindFirstChangeNotificationW
lstrlenA
CopyFileExW
TlsGetValue
SetLocalTime
GetCPInfo
InterlockedIncrement
GetQueuedCompletionStatus
ReadConsoleA
CompareFileTime
GlobalSize
GetNamedPipeHandleStateA
GlobalLock
CancelWaitableTimer
GetModuleHandleW
GetCurrentThread
GetSystemTimeAsFileTime
GetPrivateProfileStringW
WriteFile
SetCommState
GetCommandLineA
GetPrivateProfileIntA
LoadLibraryW
CopyFileW
GetSystemWindowsDirectoryA
GetConsoleAliasExesLengthW
GetVersionExW
IsProcessorFeaturePresent
TerminateProcess
GetStartupInfoW
LCMapStringA
GetPrivateProfileIntW
CreateDirectoryA
InterlockedExchange
GetStartupInfoA
SetThreadLocale
GetCPInfoExW
GetLastError
GetCurrentDirectoryW
GetProcAddress
SetFirmwareEnvironmentVariableW
SearchPathA
OpenWaitableTimerA
LoadLibraryA
Process32FirstW
LocalAlloc
GetFileType
WritePrivateProfileStringA
CreateFileMappingW
SetCurrentDirectoryW
SetThreadIdealProcessor
HeapWalk
FindAtomA
SetEnvironmentVariableA
GetThreadPriority
QueryMemoryResourceNotification
FreeEnvironmentStringsW
EnumResourceNamesA
GetStringTypeW
RequestWakeupLatency
FindAtomW
ReadConsoleOutputCharacterW
GetProfileSectionW
DeleteFileA
InterlockedDecrement
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetModuleFileNameW
HeapValidate
IsBadReadPtr
RaiseException
RtlUnwind
GetCurrentProcess
IsDebuggerPresent
TlsAlloc
TlsSetValue
GetCurrentThreadId
TlsFree
SetLastError
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
ExitProcess
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetStdHandle
HeapDestroy
HeapCreate
HeapFree
VirtualFree
GetModuleFileNameA
FlushFileBuffers
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
DebugBreak
OutputDebugStringA
WriteConsoleW
OutputDebugStringW
HeapAlloc
HeapSize
HeapReAlloc
VirtualAlloc
GetACP
GetOEMCP
IsValidCodePage
InitializeCriticalSectionAndSpinCount
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
MultiByteToWideChar
SetFilePointer
LCMapStringW
GetStringTypeA
GetLocaleInfoA
CloseHandle
CreateFileA
user32
GetComboBoxInfo
Sections
.text Size: 115KB - Virtual size: 115KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 35KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4.2MB - Virtual size: 43.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 26KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ