Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_5f94496826688bc492b3afada7dedf6b51efdf50762b31e4b42b8944f0208d91.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_5f94496826688bc492b3afada7dedf6b51efdf50762b31e4b42b8944f0208d91.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_5f94496826688bc492b3afada7dedf6b51efdf50762b31e4b42b8944f0208d91
-
Size
4.3MB
-
MD5
337d8f0520a684f29a487a5270fc6de8
-
SHA1
dd11058ca76c3d1f12a598a6617c448ff24bc82b
-
SHA256
5f94496826688bc492b3afada7dedf6b51efdf50762b31e4b42b8944f0208d91
-
SHA512
5b10316b7bbfa9aa05180b26028e818028e2288e6cd9e177062ba08ed56bfd4dcb8f59979db30cb20931e8855b1a22b398723d40abd3ad249c2c106d04836271
-
SSDEEP
98304:dRgU8KwRBkuX51TYlsrHq9DtaWFRR84+fgnpsMXKUoDqOHI:fgzZX51klEyFRR+qj50qOHI
Malware Config
Signatures
Files
-
JaffaCakes118_5f94496826688bc492b3afada7dedf6b51efdf50762b31e4b42b8944f0208d91.exe windows:5 windows x86 arch:x86
3cd0350cb20713093b4eb51a8785dabd
Code Sign
a6:8b:11:3b:e7:a0:8c:39:07:5f:c9:d2:1b:9b:9a:67Certificate
IssuerPOSTALCODE=10051Not Before27-09-2021 03:29Not After27-09-2022 03:29SubjectPOSTALCODE=100519d:77:b0:c0:00:e5:38:8e:6b:be:83:e9:bc:3e:bf:f6:5d:78:94:33:79:96:a4:eb:3d:f3:5f:26:74:b6:89:50Signer
Actual PE Digest9d:77:b0:c0:00:e5:38:8e:6b:be:83:e9:bc:3e:bf:f6:5d:78:94:33:79:96:a4:eb:3d:f3:5f:26:74:b6:89:50Digest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
C:\wuzonopa92\jotojeluzun_pezuyulicisit.pdb
Imports
kernel32
LoadResource
UpdateResourceA
InterlockedIncrement
GetEnvironmentStringsW
SetEvent
OpenSemaphoreA
GetSystemTimeAsFileTime
GetCommandLineA
WriteFileGather
CreateActCtxW
EnumResourceTypesA
GlobalAlloc
LeaveCriticalSection
GetFileAttributesA
FindNextVolumeW
ReadFile
GetLocaleInfoA
GetDevicePowerState
GetProcAddress
HeapSize
VerLanguageNameA
RemoveDirectoryA
FreeUserPhysicalPages
GlobalGetAtomNameA
PrepareTape
WriteConsoleA
GetProcessId
WaitForMultipleObjects
GetModuleFileNameA
GetModuleHandleA
ReleaseMutex
EndUpdateResourceA
FindFirstVolumeW
AddConsoleAliasA
lstrcpyW
HeapReAlloc
HeapAlloc
GetStartupInfoA
DeleteCriticalSection
EnterCriticalSection
HeapFree
VirtualFree
VirtualAlloc
HeapCreate
GetModuleHandleW
Sleep
ExitProcess
WriteFile
GetStdHandle
SetHandleCount
GetFileType
GetLastError
SetFilePointer
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
InterlockedDecrement
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
InitializeCriticalSectionAndSpinCount
RtlUnwind
LoadLibraryA
SetStdHandle
GetConsoleCP
GetConsoleMode
FlushFileBuffers
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
GetConsoleOutputCP
WriteConsoleW
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
CloseHandle
CreateFileA
user32
GetCursorPos
gdi32
GetCharWidthFloatA
advapi32
DeregisterEventSource
Exports
Exports
@SetFirstEverVice@8
Sections
.text Size: 4.3MB - Virtual size: 4.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 533KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 49KB - Virtual size: 4.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ