Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_7daabd297d02abe6fd9aaea3368753cf64eff900cd6cc7e85f5d2529f74f27da.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
JaffaCakes118_7daabd297d02abe6fd9aaea3368753cf64eff900cd6cc7e85f5d2529f74f27da.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_7daabd297d02abe6fd9aaea3368753cf64eff900cd6cc7e85f5d2529f74f27da
-
Size
4.4MB
-
MD5
ee38f13dfbf65f068c0d0373ddd278f6
-
SHA1
1daff39a2d391873be38f6f3e3bc1b02a8bf12de
-
SHA256
7daabd297d02abe6fd9aaea3368753cf64eff900cd6cc7e85f5d2529f74f27da
-
SHA512
3636ab08fc1c5f711229547ce6f98f8692ae1aef847014ea33d2dd593061405f44bb135679648499b27330c3478c038b9c9c77561c56c7fb38853035e257a6c0
-
SSDEEP
98304:YXm5RWzb+T2oTmUpMhLt4gY7Emijjb8lsWFGEcaxBzQmfGLfA4F8jx:/RmNWMhLII8l/UdabzQmej1F8jx
Malware Config
Signatures
Files
-
JaffaCakes118_7daabd297d02abe6fd9aaea3368753cf64eff900cd6cc7e85f5d2529f74f27da.exe windows:5 windows x86 arch:x86
fed89e16f65d1d3c8d240cd56f909722
Code Sign
5b:10:42:0e:0f:42:ee:6d:a0:1b:d3:84:ea:e4:0c:46Certificate
IssuerPOSTALCODE=10188Not Before18-08-2021 15:32Not After18-08-2022 15:32SubjectPOSTALCODE=1018801:b4:7c:bb:ef:c7:75:26:59:62:c7:2d:10:1b:d3:85:a9:6b:ce:2b:ee:e4:52:f0:46:a0:04:d9:f4:d9:a0:deSigner
Actual PE Digest01:b4:7c:bb:ef:c7:75:26:59:62:c7:2d:10:1b:d3:85:a9:6b:ce:2b:ee:e4:52:f0:46:a0:04:d9:f4:d9:a0:deDigest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
C:\rigonalo\femocuru\beniwisoruyuki-xevogaxonusafa\xuwoy.pdb
Imports
kernel32
SetLocalTime
WriteConsoleOutputW
InterlockedIncrement
GetConsoleAliasA
InterlockedDecrement
GetSystemWindowsDirectoryW
SetEnvironmentVariableW
GetEnvironmentStringsW
WaitForSingleObject
SetEvent
GetSystemDefaultLCID
GetModuleHandleW
GetConsoleAliasesLengthA
GetCompressedFileSizeW
CreateActCtxW
InitializeCriticalSection
GetConsoleCP
GetSystemDirectoryW
GetVersionExW
GetFileAttributesA
lstrcpynW
SetConsoleCursorPosition
VerifyVersionInfoA
WritePrivateProfileSectionW
IsBadWritePtr
GetModuleFileNameW
CreateFileW
EnumDateFormatsExW
GetACP
lstrlenW
FlushFileBuffers
InterlockedExchange
GetCPInfoExW
FillConsoleOutputCharacterW
GetLastError
GetProcAddress
PeekConsoleInputW
CreateTimerQueueTimer
LocalLock
GetConsoleDisplayMode
EnterCriticalSection
SetTimerQueueTimer
GlobalGetAtomNameA
WriteConsoleA
LocalAlloc
DnsHostnameToComputerNameA
BeginUpdateResourceA
GetModuleHandleA
HeapSetInformation
EraseTape
GetConsoleTitleW
FindFirstVolumeA
EndUpdateResourceA
ReadConsoleInputW
GetCurrentProcessId
AreFileApisANSI
lstrcatA
LCMapStringW
LCMapStringA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
HeapAlloc
Sleep
ExitProcess
GetCommandLineA
GetStartupInfoA
WriteFile
GetStdHandle
GetModuleFileNameA
DeleteCriticalSection
LeaveCriticalSection
HeapFree
VirtualFree
VirtualAlloc
HeapReAlloc
HeapCreate
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
TerminateProcess
GetCurrentProcess
IsDebuggerPresent
LoadLibraryA
InitializeCriticalSectionAndSpinCount
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
SetHandleCount
GetFileType
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
RtlUnwind
RaiseException
GetCPInfo
GetOEMCP
IsValidCodePage
HeapSize
GetLocaleInfoA
GetStringTypeA
MultiByteToWideChar
GetStringTypeW
user32
RealGetWindowClassA
advapi32
AdjustTokenGroups
Exports
Exports
@GetAnotherVice@12
@SetFirstEverVice@4
Sections
.text Size: 4.3MB - Virtual size: 4.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 15KB - Virtual size: 40.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 49KB - Virtual size: 49KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ