Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_f18be5e3038b83166e01210cce785ab53f9d8013c4da5f2016f55f82edd1d659.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_f18be5e3038b83166e01210cce785ab53f9d8013c4da5f2016f55f82edd1d659.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_f18be5e3038b83166e01210cce785ab53f9d8013c4da5f2016f55f82edd1d659
-
Size
4.1MB
-
MD5
729f9bd6c031bf9f5b2c64ee08c1827f
-
SHA1
dfebcb6398c000acbcc65696384db1eb1fab74c6
-
SHA256
f18be5e3038b83166e01210cce785ab53f9d8013c4da5f2016f55f82edd1d659
-
SHA512
838b0259e38f6d63f5ed6c3ce3cd622ad505247e438b017ac6cde4efddc1a3b3671795c229faf1cb2697f87f50c549daa5e22747e331447271bccd758b6c265a
-
SSDEEP
98304:gG0rsWvdb8IV/OSAiSsW+C9T4ySbsI0/uAl0w8ppY:d03vCIVWSbVsT4950GAl0JpY
Malware Config
Signatures
Files
-
JaffaCakes118_f18be5e3038b83166e01210cce785ab53f9d8013c4da5f2016f55f82edd1d659.exe windows:5 windows x86 arch:x86
a4f2eb6f530f70bf0bd87392bfbcd7f1
Code Sign
56:0e:23:e5:b4:8e:43:1f:da:81:2c:77:30:3f:1c:48Certificate
IssuerPOSTALCODE=10305Not Before22/10/2022, 22:27Not After22/10/2023, 22:27SubjectPOSTALCODE=10305d9:cb:c1:a7:7b:de:37:5a:e3:a8:ec:e8:bc:b6:48:ef:2d:ad:cf:17:7f:3b:b9:f3:20:08:40:8a:b8:5c:c9:f9Signer
Actual PE Digestd9:cb:c1:a7:7b:de:37:5a:e3:a8:ec:e8:bc:b6:48:ef:2d:ad:cf:17:7f:3b:b9:f3:20:08:40:8a:b8:5c:c9:f9Digest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
C:\civovaka\rev\sayixibiwi\wunizi hesumavi mu.pdb
Imports
kernel32
GetConsoleAliasesLengthW
GetConsoleAliasExesA
LoadResource
VerSetConditionMask
InterlockedDecrement
WaitNamedPipeA
GetSystemDefaultLCID
GetGeoInfoW
GlobalAlloc
SetFileShortNameW
LoadLibraryW
GetFileAttributesA
GetConsoleAliasW
GetFileAttributesW
WriteConsoleW
lstrlenW
RaiseException
LCMapStringA
OpenMutexW
SetLastError
GetProcAddress
FindVolumeMountPointClose
VirtualAlloc
SetFirmwareEnvironmentVariableW
IsValidCodePage
SetComputerNameA
LoadLibraryA
LocalAlloc
AddAtomW
FoldStringA
GetModuleHandleA
CreateMutexA
FreeEnvironmentStringsW
FindNextFileW
GetFileAttributesExW
TerminateJobObject
LCMapStringW
GetStartupInfoW
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
GetLastError
SetFilePointer
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EnterCriticalSection
LeaveCriticalSection
GetModuleHandleW
Sleep
ExitProcess
WriteFile
GetModuleFileNameA
GetModuleFileNameW
GetEnvironmentStringsW
GetCommandLineW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
GetCurrentThreadId
HeapCreate
VirtualFree
HeapFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
InitializeCriticalSectionAndSpinCount
SetStdHandle
RtlUnwind
GetCPInfo
GetACP
GetOEMCP
HeapAlloc
HeapReAlloc
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
FlushFileBuffers
MultiByteToWideChar
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
HeapSize
CloseHandle
WriteConsoleA
GetConsoleOutputCP
CreateFileA
Sections
.text Size: 67KB - Virtual size: 66KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 3.9MB - Virtual size: 43.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 29KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ