Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_06fcf9260b3df8bb5f136b06801023658cc5e4b53f39362f2d475da96cce816a.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
JaffaCakes118_06fcf9260b3df8bb5f136b06801023658cc5e4b53f39362f2d475da96cce816a.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_06fcf9260b3df8bb5f136b06801023658cc5e4b53f39362f2d475da96cce816a
-
Size
4.4MB
-
MD5
5838784fcaaf0cd0ff7d26342e5b8667
-
SHA1
40c971997c690dc0594579bf9956a597d07e246d
-
SHA256
06fcf9260b3df8bb5f136b06801023658cc5e4b53f39362f2d475da96cce816a
-
SHA512
3b1b4f3c5ef19b7e34b29ddfa12d1d8fdd02277e14e40c1813a1f3b992c4bad0bd04d7e9abd952406f225e1df8c59a6ab2c4793d97e2df03156444fdfa384a2e
-
SSDEEP
98304:j8wBQvHNu/JwUNX4j5DzE1BQTSiQRG04TfzBhcrZ/:QUQvtueUccpi0A/MrR
Malware Config
Signatures
Files
-
JaffaCakes118_06fcf9260b3df8bb5f136b06801023658cc5e4b53f39362f2d475da96cce816a.exe windows:5 windows x86 arch:x86
3a2f812f2b473efc33d336491680df9e
Code Sign
1c:a7:30:4e:8f:13:de:16:09:72:97:8f:f9:1c:7b:14Certificate
IssuerPOSTALCODE=10051Not Before07-09-2021 08:50Not After07-09-2022 08:50SubjectPOSTALCODE=100518c:e4:78:9d:7f:bb:7c:95:c2:f8:0e:4d:3f:f5:aa:b3:62:10:9b:9e:75:c8:33:75:6b:d6:15:44:ab:3a:a5:4bSigner
Actual PE Digest8c:e4:78:9d:7f:bb:7c:95:c2:f8:0e:4d:3f:f5:aa:b3:62:10:9b:9e:75:c8:33:75:6b:d6:15:44:ab:3a:a5:4bDigest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
C:\laga.pdb
Imports
kernel32
FileTimeToDosDateTime
FindFirstChangeNotificationW
lstrlenA
CopyFileExW
TlsGetValue
GetCPInfo
InterlockedIncrement
GetQueuedCompletionStatus
ReadConsoleA
CompareFileTime
GlobalSize
GetNamedPipeHandleStateA
GlobalLock
CancelWaitableTimer
GetModuleHandleW
GetCurrentThread
GetSystemTimeAsFileTime
WriteFile
SetCommState
GetCommandLineA
GetPrivateProfileIntA
LoadLibraryW
CopyFileW
GetSystemWindowsDirectoryA
GetConsoleAliasExesLengthW
GetVersionExW
IsProcessorFeaturePresent
TerminateProcess
SetThreadPriority
GetStartupInfoW
LCMapStringA
GetPrivateProfileIntW
CreateDirectoryA
InterlockedExchange
GetStartupInfoA
SetThreadLocale
GetCPInfoExW
GetLastError
GetCurrentDirectoryW
GetProcAddress
SetFirmwareEnvironmentVariableW
SearchPathA
GetPrivateProfileStringA
OpenWaitableTimerA
LoadLibraryA
Process32FirstW
LocalAlloc
GetFileType
CreateFileMappingW
SetCurrentDirectoryW
SetThreadIdealProcessor
HeapWalk
FindAtomA
SetEnvironmentVariableA
QueryMemoryResourceNotification
FreeEnvironmentStringsW
EnumResourceNamesA
GetStringTypeW
RequestWakeupLatency
FindAtomW
ReadConsoleOutputCharacterW
GetSystemTime
GetProfileSectionW
DeleteFileA
CreateFileA
InterlockedDecrement
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
MultiByteToWideChar
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetModuleFileNameW
HeapValidate
IsBadReadPtr
RaiseException
RtlUnwind
GetCurrentProcess
IsDebuggerPresent
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsSetValue
GetCurrentThreadId
TlsFree
SetLastError
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
ExitProcess
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetStdHandle
HeapDestroy
HeapCreate
HeapFree
VirtualFree
GetModuleFileNameA
FlushFileBuffers
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
DebugBreak
OutputDebugStringA
WriteConsoleW
OutputDebugStringW
HeapAlloc
HeapSize
HeapReAlloc
VirtualAlloc
InitializeCriticalSectionAndSpinCount
LCMapStringW
GetStringTypeA
GetLocaleInfoA
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
SetFilePointer
CloseHandle
user32
GetComboBoxInfo
msimg32
AlphaBlend
Sections
.text Size: 116KB - Virtual size: 115KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 35KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4.2MB - Virtual size: 43.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 26KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ