Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_26a6dc5aab46c8263eebf2e0b97b53fb074137eb51b952458c4438f7443f3db5.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_26a6dc5aab46c8263eebf2e0b97b53fb074137eb51b952458c4438f7443f3db5.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_26a6dc5aab46c8263eebf2e0b97b53fb074137eb51b952458c4438f7443f3db5
-
Size
4.4MB
-
MD5
0f3fa91058e0f021857131b041c07883
-
SHA1
20566a89d5d7f34d8fff7736ddd3808e61eaab02
-
SHA256
26a6dc5aab46c8263eebf2e0b97b53fb074137eb51b952458c4438f7443f3db5
-
SHA512
1e41327147b99a7b2c3f1b8efd1777845896c22e65ac78e2235994ef64aed72e0d2910ddbb888aaef580a582dd53e2a92c5d4f6fe5af4ff6c12fc0dd6c2b6cb2
-
SSDEEP
98304:j8wBQvHNu/JwUNX4j5DzE1BQTSiQRG04TfzBhcrZq:QUQvtueUccpi0A/Mr8
Malware Config
Signatures
Files
-
JaffaCakes118_26a6dc5aab46c8263eebf2e0b97b53fb074137eb51b952458c4438f7443f3db5.exe windows:5 windows x86 arch:x86
3a2f812f2b473efc33d336491680df9e
Code Sign
f5:9a:74:eb:e7:9b:7f:71:f3:80:16:3a:a3:80:58:8eCertificate
IssuerPOSTALCODE=10124Not Before07-09-2021 08:50Not After07-09-2022 08:50SubjectPOSTALCODE=101248c:e4:78:9d:7f:bb:7c:95:c2:f8:0e:4d:3f:f5:aa:b3:62:10:9b:9e:75:c8:33:75:6b:d6:15:44:ab:3a:a5:4bSigner
Actual PE Digest8c:e4:78:9d:7f:bb:7c:95:c2:f8:0e:4d:3f:f5:aa:b3:62:10:9b:9e:75:c8:33:75:6b:d6:15:44:ab:3a:a5:4bDigest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
C:\laga.pdb
Imports
kernel32
FileTimeToDosDateTime
FindFirstChangeNotificationW
lstrlenA
CopyFileExW
TlsGetValue
GetCPInfo
InterlockedIncrement
GetQueuedCompletionStatus
ReadConsoleA
CompareFileTime
GlobalSize
GetNamedPipeHandleStateA
GlobalLock
CancelWaitableTimer
GetModuleHandleW
GetCurrentThread
GetSystemTimeAsFileTime
WriteFile
SetCommState
GetCommandLineA
GetPrivateProfileIntA
LoadLibraryW
CopyFileW
GetSystemWindowsDirectoryA
GetConsoleAliasExesLengthW
GetVersionExW
IsProcessorFeaturePresent
TerminateProcess
SetThreadPriority
GetStartupInfoW
LCMapStringA
GetPrivateProfileIntW
CreateDirectoryA
InterlockedExchange
GetStartupInfoA
SetThreadLocale
GetCPInfoExW
GetLastError
GetCurrentDirectoryW
GetProcAddress
SetFirmwareEnvironmentVariableW
SearchPathA
GetPrivateProfileStringA
OpenWaitableTimerA
LoadLibraryA
Process32FirstW
LocalAlloc
GetFileType
CreateFileMappingW
SetCurrentDirectoryW
SetThreadIdealProcessor
HeapWalk
FindAtomA
SetEnvironmentVariableA
QueryMemoryResourceNotification
FreeEnvironmentStringsW
EnumResourceNamesA
GetStringTypeW
RequestWakeupLatency
FindAtomW
ReadConsoleOutputCharacterW
GetSystemTime
GetProfileSectionW
DeleteFileA
CreateFileA
InterlockedDecrement
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
MultiByteToWideChar
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetModuleFileNameW
HeapValidate
IsBadReadPtr
RaiseException
RtlUnwind
GetCurrentProcess
IsDebuggerPresent
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsSetValue
GetCurrentThreadId
TlsFree
SetLastError
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
ExitProcess
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetStdHandle
HeapDestroy
HeapCreate
HeapFree
VirtualFree
GetModuleFileNameA
FlushFileBuffers
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
DebugBreak
OutputDebugStringA
WriteConsoleW
OutputDebugStringW
HeapAlloc
HeapSize
HeapReAlloc
VirtualAlloc
InitializeCriticalSectionAndSpinCount
LCMapStringW
GetStringTypeA
GetLocaleInfoA
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
SetFilePointer
CloseHandle
user32
GetComboBoxInfo
msimg32
AlphaBlend
Sections
.text Size: 116KB - Virtual size: 115KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 35KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4.2MB - Virtual size: 43.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 26KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ