Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_b12fc3d3d0dd43c9360fa3a29ba1b964bb0e65ce3193d5de5643c6222cb180d7.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
JaffaCakes118_b12fc3d3d0dd43c9360fa3a29ba1b964bb0e65ce3193d5de5643c6222cb180d7.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_b12fc3d3d0dd43c9360fa3a29ba1b964bb0e65ce3193d5de5643c6222cb180d7
-
Size
4.3MB
-
MD5
bf07d5218811401181fd59912ed5a7e8
-
SHA1
5985b4c04dc38eb5929b648c1202b09d6427479f
-
SHA256
b12fc3d3d0dd43c9360fa3a29ba1b964bb0e65ce3193d5de5643c6222cb180d7
-
SHA512
c3b4f5a04771a5445037760d6e8ddca79a365f88f279837fb8129073dd92eab6395adbfc5cd919c3547d57d817b227c9aad8af9dfce2e1e06af7989aee774472
-
SSDEEP
49152:rq8mo7GRqm8Ko1euFEZDTWdJuB+u57imRETwtZz2LCGLly9zIaYldOgilDh7oPM/:rq8l5J1FE5Bv7hRE8O/ezIaYlKNH8wd
Malware Config
Signatures
Files
-
JaffaCakes118_b12fc3d3d0dd43c9360fa3a29ba1b964bb0e65ce3193d5de5643c6222cb180d7.exe windows:5 windows x86 arch:x86
0da13809a194b2b672473d74453a5086
Code Sign
df:e2:4b:43:82:22:20:de:35:28:97:b3:42:c8:35:a1Certificate
IssuerPOSTALCODE=10305Not Before11-11-2021 12:40Not After11-11-2022 12:40SubjectPOSTALCODE=103053a:a9:a7:34:c5:f0:10:60:c9:3e:fd:75:0d:99:eb:e6:22:a0:d1:f2:47:65:d1:bd:82:7a:0e:e2:70:67:5c:afSigner
Actual PE Digest3a:a9:a7:34:c5:f0:10:60:c9:3e:fd:75:0d:99:eb:e6:22:a0:d1:f2:47:65:d1:bd:82:7a:0e:e2:70:67:5c:afDigest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
C:\pisaxid.pdb
Imports
kernel32
TlsGetValue
SetDllDirectoryW
InterlockedIncrement
_lwrite
ZombifyActCtx
GetSystemWindowsDirectoryW
GetNamedPipeHandleStateA
SetHandleInformation
SetConsoleScreenBufferSize
CancelWaitableTimer
SetVolumeMountPointW
FindFirstFileExW
FreeEnvironmentStringsA
GetModuleHandleW
GetSystemTimeAsFileTime
GetPrivateProfileStringW
ReadConsoleW
GetWindowsDirectoryA
GetSystemWow64DirectoryA
QueryActCtxW
GetSystemTimes
GlobalAlloc
GlobalFindAtomA
LoadLibraryW
ReadConsoleInputA
SizeofResource
SetConsoleMode
HeapValidate
GetVolumePathNamesForVolumeNameW
VerifyVersionInfoA
GetModuleFileNameW
GetConsoleAliasesLengthW
CreateActCtxA
CompareStringW
GetACP
GetStartupInfoW
GetLastError
IsDBCSLeadByteEx
SetLastError
GetProcAddress
SetFirmwareEnvironmentVariableW
CreateNamedPipeA
CopyFileA
GlobalGetAtomNameA
SearchPathA
GetPrivateProfileStringA
OpenWaitableTimerW
WritePrivateProfileStringA
GetModuleFileNameA
WTSGetActiveConsoleSessionId
SetConsoleCursorInfo
GetProcessShutdownParameters
BuildCommDCBA
GetCurrentDirectoryA
GetFileTime
GetVersionExA
FileTimeToLocalFileTime
TlsFree
GetProfileSectionW
CommConfigDialogW
GetSystemDirectoryA
FindFirstChangeNotificationW
DeleteFileA
GetCommandLineA
HeapSetInformation
InterlockedDecrement
DecodePointer
ExitProcess
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EncodePointer
WriteFile
GetStdHandle
EnterCriticalSection
LeaveCriticalSection
IsProcessorFeaturePresent
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
IsBadReadPtr
TlsAlloc
TlsSetValue
HeapCreate
GetOEMCP
GetCPInfo
IsValidCodePage
OutputDebugStringA
WriteConsoleW
OutputDebugStringW
RtlUnwind
MultiByteToWideChar
RaiseException
SetFilePointer
GetConsoleCP
GetConsoleMode
HeapAlloc
HeapReAlloc
HeapSize
HeapQueryInformation
HeapFree
LCMapStringW
GetStringTypeW
FlushFileBuffers
ReadFile
SetStdHandle
CloseHandle
CreateFileW
gdi32
GetBitmapBits
Sections
.text Size: 4.2MB - Virtual size: 4.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 39.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 74KB - Virtual size: 73KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ