Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_1dd2a41cd03d3f110ac9401d6d9406936626f009325a093babe480d202f32f4f.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
JaffaCakes118_1dd2a41cd03d3f110ac9401d6d9406936626f009325a093babe480d202f32f4f.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_1dd2a41cd03d3f110ac9401d6d9406936626f009325a093babe480d202f32f4f
-
Size
4.1MB
-
MD5
308ff0bf61f28bd00f406e21b962aa06
-
SHA1
6902585c425278673c09bb9913b2b69e1e340f81
-
SHA256
1dd2a41cd03d3f110ac9401d6d9406936626f009325a093babe480d202f32f4f
-
SHA512
febf9a0a19ad7a0bb8d49139dc58872fa57f7c723f9ca18b27c79d00dbdda82222299ccf731498265ab04ba51f04075e55e19c457741c16ba72ef3eee28548c0
-
SSDEEP
98304:7ZjzSM2ColSsGpet7aLsdp2cA6neXTUo27tT1wD9CpXcq:xzH2CMaWuLux5eDUo27tT1fpXZ
Malware Config
Signatures
Files
-
JaffaCakes118_1dd2a41cd03d3f110ac9401d6d9406936626f009325a093babe480d202f32f4f.exe windows:5 windows x86 arch:x86
1fdc022135d24d585910f65d062a8c26
Code Sign
68:50:57:3a:7d:8f:64:b2:cc:f9:3f:e7:ca:28:3e:e3Certificate
IssuerPOSTALCODE=10305Not Before18-10-2022 11:17Not After18-10-2023 11:17SubjectPOSTALCODE=1030515:07:af:38:29:9f:f0:73:d9:1f:84:82:0d:30:64:81:d5:e7:2a:c5:c4:fc:ee:e4:23:8f:ee:bc:48:a8:f8:24Signer
Actual PE Digest15:07:af:38:29:9f:f0:73:d9:1f:84:82:0d:30:64:81:d5:e7:2a:c5:c4:fc:ee:e4:23:8f:ee:bc:48:a8:f8:24Digest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
C:\duzosijidibomu_73\dotoj_zikina22\tokidini\duhoge\yodirizif v.pdb
Imports
kernel32
GetSystemDefaultLangID
CreateMutexW
GetConsoleAliasesLengthW
InterlockedIncrement
VerSetConditionMask
GetConsoleAliasA
SleepEx
GetFileAttributesExA
WaitNamedPipeW
SetCommTimeouts
EnumResourceTypesA
SetFileShortNameW
LoadLibraryW
GetFileAttributesA
DnsHostnameToComputerNameW
GetConsoleAliasW
GetFileAttributesW
WriteConsoleW
GetBinaryTypeA
IsBadWritePtr
GetGeoInfoA
GetCompressedFileSizeA
GetTimeZoneInformation
GetLastError
GetProcAddress
VirtualAlloc
HeapSize
SetComputerNameA
LoadLibraryA
WriteConsoleA
LocalAlloc
CreateEventW
AddAtomA
FoldStringA
FindNextFileA
GetModuleHandleA
FreeEnvironmentStringsW
SetFileShortNameA
ReadConsoleInputW
GetVersion
EnumResourceLanguagesW
SetFileAttributesW
LCMapStringW
LocalFileTimeToFileTime
GetStartupInfoW
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EnterCriticalSection
LeaveCriticalSection
GetModuleHandleW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
InterlockedDecrement
Sleep
ExitProcess
SetFilePointer
WriteFile
GetStdHandle
GetModuleFileNameA
GetModuleFileNameW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
DeleteCriticalSection
HeapCreate
VirtualFree
HeapFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
MultiByteToWideChar
RtlUnwind
HeapAlloc
HeapReAlloc
InitializeCriticalSectionAndSpinCount
WideCharToMultiByte
SetStdHandle
GetConsoleCP
GetConsoleMode
FlushFileBuffers
LCMapStringA
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
RaiseException
GetConsoleOutputCP
CloseHandle
CreateFileA
user32
ClientToScreen
Sections
.text Size: 71KB - Virtual size: 70KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 3.9MB - Virtual size: 3.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 41KB - Virtual size: 4.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 15KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ