Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_44203c30c9269f7f4ee8ec37058432aea37c8a816f91d2cb8d1bccbaedab5b28.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_44203c30c9269f7f4ee8ec37058432aea37c8a816f91d2cb8d1bccbaedab5b28.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_44203c30c9269f7f4ee8ec37058432aea37c8a816f91d2cb8d1bccbaedab5b28
-
Size
4.3MB
-
MD5
bbe3c179159c4458f7fc4fed909d2071
-
SHA1
ce2ea116c5f5fcf82b71eb105da1b2740b14780a
-
SHA256
44203c30c9269f7f4ee8ec37058432aea37c8a816f91d2cb8d1bccbaedab5b28
-
SHA512
95e0477b46297c11aef7bd3722948a7fce1f931b30650dfc670bb7f212207719f89858547ef4299f1c709da21bf022b5ea622140a8455805066aef6ab4d3a81b
-
SSDEEP
98304:fWjbOBq/5WqkmZxQ2H9rYGlpE5APV+pUfAE3WMKmzeZvT0fOAon5mxe:HBA3ZPHjlWaVjfAE3WooLUOd5r
Malware Config
Signatures
Files
-
JaffaCakes118_44203c30c9269f7f4ee8ec37058432aea37c8a816f91d2cb8d1bccbaedab5b28.exe windows:5 windows x86 arch:x86
3e77a5228ebd8b068a37deeb2c688fdb
Code Sign
58:f2:ec:bd:c7:04:49:1d:3c:b1:a1:ad:f4:7f:77:99Certificate
IssuerPOSTALCODE=10188Not Before24-08-2021 12:49Not After24-08-2022 12:49SubjectPOSTALCODE=1018800:72:f8:1c:a8:09:f3:54:c3:59:55:0f:27:f0:02:2c:a6:40:a0:12:eb:e2:ad:1e:d4:59:25:26:1b:bf:3c:58Signer
Actual PE Digest00:72:f8:1c:a8:09:f3:54:c3:59:55:0f:27:f0:02:2c:a6:40:a0:12:eb:e2:ad:1e:d4:59:25:26:1b:bf:3c:58Digest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
C:\zumawezunubazi42\yudozura.pdb
Imports
kernel32
WriteConsoleOutputCharacterW
GetConsoleAliasesLengthW
BuildCommDCBAndTimeoutsA
InterlockedIncrement
InterlockedDecrement
GetCurrentProcess
GetSystemWindowsDirectoryW
SetEnvironmentVariableW
GetSystemDefaultLCID
GetModuleHandleW
SetThreadUILanguage
IsBadReadPtr
GetConsoleAliasesLengthA
GetEnvironmentStrings
GetConsoleCP
ReadConsoleInputA
SetVolumeMountPointA
WriteConsoleOutputA
LeaveCriticalSection
lstrcpynW
SetConsoleCursorPosition
GetFileAttributesW
GetMailslotInfo
GetModuleFileNameW
GetTimeZoneInformation
lstrcatA
LocalUnlock
FlushFileBuffers
GetConsoleOutputCP
InterlockedExchange
FillConsoleOutputCharacterW
GetLastError
ChangeTimerQueueTimer
GetProcAddress
PeekConsoleInputW
BeginUpdateResourceW
EnumDateFormatsExA
CreateTimerQueueTimer
GlobalGetAtomNameA
ResetEvent
GetLocalTime
LoadLibraryA
WriteConsoleA
LocalAlloc
SetFileApisToANSI
GetOEMCP
HeapSetInformation
GetConsoleTitleW
GetCPInfoExA
ReleaseMutex
FindFirstVolumeW
DeleteTimerQueueTimer
GetCurrentProcessId
GetConsoleProcessList
EnumCalendarInfoExA
lstrlenW
GetSystemDefaultLangID
UnhandledExceptionFilter
SetUnhandledExceptionFilter
HeapAlloc
GetCommandLineA
GetStartupInfoA
RaiseException
RtlUnwind
Sleep
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
TerminateProcess
IsDebuggerPresent
HeapFree
DeleteCriticalSection
EnterCriticalSection
VirtualFree
VirtualAlloc
HeapReAlloc
HeapCreate
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
InitializeCriticalSectionAndSpinCount
HeapSize
GetCPInfo
GetACP
IsValidCodePage
GetLocaleInfoA
LCMapStringA
MultiByteToWideChar
LCMapStringW
GetStringTypeA
GetStringTypeW
user32
GetAltTabInfoW
Exports
Exports
@SetFirstEverVice@8
Sections
.text Size: 4.3MB - Virtual size: 4.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 14KB - Virtual size: 40.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 43KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ