Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_d3c708c3476bbd5fcfbd16a36f61914088161260390e6125c3e235990cb85bf2.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
JaffaCakes118_d3c708c3476bbd5fcfbd16a36f61914088161260390e6125c3e235990cb85bf2.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_d3c708c3476bbd5fcfbd16a36f61914088161260390e6125c3e235990cb85bf2
-
Size
4.3MB
-
MD5
a3405442db2c5ab53c96e9dc63cb107a
-
SHA1
a0a85c15a60c9c7bdf62dbbff36a2c7cb113f86f
-
SHA256
d3c708c3476bbd5fcfbd16a36f61914088161260390e6125c3e235990cb85bf2
-
SHA512
a1afa34d261537d85e464132eb9b202cf6ded47bec81c8956a5836e0ce3f588826da0585b8eb8b107ade98c3cd171a6aced08905c04207d27c60bdf420efd91e
-
SSDEEP
98304:y74w07859zsJDz39VDPvmN1uN5jadHNs9PcL:tw04wJDzNVTuzuTudS9k
Malware Config
Signatures
Files
-
JaffaCakes118_d3c708c3476bbd5fcfbd16a36f61914088161260390e6125c3e235990cb85bf2.exe windows:5 windows x86 arch:x86
57fcd4b73bdcb72ae43e8e838f842fae
Code Sign
76:8b:7c:13:13:21:6b:80:75:42:0b:67:83:a0:ef:fdCertificate
IssuerPOSTALCODE=10301Not Before23-11-2021 16:07Not After23-11-2022 16:07SubjectPOSTALCODE=1030191:50:ab:5d:f7:40:af:29:52:e3:c3:27:b4:11:19:93:26:50:91:54:e6:34:e1:08:a5:82:e9:21:93:28:59:4dSigner
Actual PE Digest91:50:ab:5d:f7:40:af:29:52:e3:c3:27:b4:11:19:93:26:50:91:54:e6:34:e1:08:a5:82:e9:21:93:28:59:4dDigest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
C:\zoxodipogogi.pdb
Imports
kernel32
UnregisterWait
GetNumaNodeProcessorMask
SetCriticalSectionSpinCount
SearchPathW
SetInformationJobObject
lstrcmpA
FindFirstFileW
SetThreadContext
EnumCalendarInfoA
WriteConsoleInputW
IsBadStringPtrW
lstrlenA
GetConsoleAliasesLengthW
EnumDateFormatsExW
CopyFileExW
GetNumaProcessorNode
TlsGetValue
SetLocalTime
UnmapViewOfFile
MoveFileExA
CommConfigDialogA
GetNumberOfConsoleInputEvents
GetConsoleAliasExesLengthA
SetErrorMode
FindResourceW
FreeLibrary
DeleteVolumeMountPointA
SetUnhandledExceptionFilter
LoadLibraryExW
SetDllDirectoryW
InterlockedIncrement
GetQueuedCompletionStatus
VerSetConditionMask
MoveFileExW
InterlockedDecrement
WaitNamedPipeA
SetMailslotInfo
SetConsoleActiveScreenBuffer
WritePrivateProfileSectionA
SetDefaultCommConfigW
SetEnvironmentVariableW
GetNamedPipeHandleStateA
SignalObjectAndWait
AddConsoleAliasW
GetComputerNameW
SetEvent
SetThreadExecutionState
OpenSemaphoreA
CreateHardLinkA
GetFileAttributesExA
_lclose
GetModuleHandleW
GetTickCount
GetCommConfig
GetProcessHeap
IsBadReadPtr
GetSystemTimeAsFileTime
GetPrivateProfileStringW
GetConsoleTitleA
ReadConsoleW
CreateRemoteThread
GetCompressedFileSizeW
EnumTimeFormatsA
SetCommTimeouts
CreateActCtxW
InitializeCriticalSection
GetProcessTimes
TlsSetValue
AllocateUserPhysicalPages
OpenProcess
FindResourceExA
GlobalAlloc
GetPrivateProfileIntA
LoadLibraryW
GetConsoleMode
FatalAppExitW
GetThreadSelectorEntry
AssignProcessToJobObject
GetCalendarInfoA
ReadFileScatter
SetSystemTimeAdjustment
SetVolumeMountPointA
ReadConsoleOutputW
SetConsoleCP
InterlockedPopEntrySList
LeaveCriticalSection
GetFileAttributesA
GlobalFlags
lstrcpynW
GetNamedPipeInfo
HeapValidate
GetVolumePathNamesForVolumeNameW
CreateSemaphoreA
SetConsoleCursorPosition
VerifyVersionInfoA
HeapQueryInformation
WritePrivateProfileSectionW
TerminateProcess
GetAtomNameW
FileTimeToSystemTime
EnumResourceNamesW
lstrcatA
GetBinaryTypeW
CompareStringW
ExitThread
GetVolumePathNameA
lstrlenW
SetConsoleTitleA
WritePrivateProfileStringW
GlobalUnlock
VirtualUnlock
GetTempPathW
GetStringTypeExA
CreateJobObjectA
GetLargestConsoleWindowSize
GetPrivateProfileIntW
InterlockedExchange
ReleaseActCtx
SetCurrentDirectoryA
GetStdHandle
FindFirstFileA
GetLastError
ChangeTimerQueueTimer
GetLongPathNameW
BindIoCompletionCallback
GetProcAddress
FindVolumeMountPointClose
VirtualAlloc
HeapSize
BackupWrite
VerLanguageNameA
SetFirmwareEnvironmentVariableW
CreateNamedPipeA
CreateJobSet
LocalLock
LockFileEx
BuildCommDCBW
DefineDosDeviceA
FindClose
GetPrivateProfileStringA
LoadLibraryA
Process32FirstW
OpenMutexA
ProcessIdToSessionId
MoveFileA
BuildCommDCBAndTimeoutsW
GetExitCodeThread
GetNumberFormatW
SetFileApisToANSI
QueryDosDeviceW
SetConsoleWindowInfo
SetThreadIdealProcessor
HeapWalk
GetPrivateProfileStructA
GetTapeParameters
GetVolumePathNamesForVolumeNameA
GetModuleFileNameA
GetDefaultCommConfigA
FindNextFileA
WriteProfileStringA
WTSGetActiveConsoleSessionId
EnumDateFormatsA
WaitCommEvent
_lread
FindFirstChangeNotificationA
GetProcessShutdownParameters
QueueUserWorkItem
ContinueDebugEvent
IsDebuggerPresent
GetProcessAffinityMask
FreeEnvironmentStringsW
EnumResourceNamesA
WriteProfileStringW
EnumDateFormatsW
FatalAppExitA
PeekConsoleInputA
DeleteCriticalSection
WriteConsoleOutputAttribute
OutputDebugStringA
GetCPInfoExA
DuplicateHandle
FindFirstVolumeA
GetVersionExA
ReadConsoleInputW
TlsAlloc
TerminateJobObject
CloseHandle
GetVersion
DeleteTimerQueueTimer
GlobalAddAtomW
SetFileValidData
FindActCtxSectionStringW
ResetWriteWatch
UnregisterWaitEx
ReadConsoleOutputCharacterW
TlsFree
GetProfileSectionW
EnumSystemLocalesW
lstrcpyW
CreateFileW
SetStdHandle
GetThreadContext
GetPrivateProfileSectionNamesW
GetFullPathNameA
GetModuleFileNameW
ExitProcess
RaiseException
GetCommandLineW
HeapSetInformation
GetStartupInfoW
QueryPerformanceCounter
GetCurrentThreadId
GetCurrentProcessId
DecodePointer
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
EncodePointer
SetLastError
HeapCreate
WriteFile
GetACP
GetOEMCP
GetCPInfo
IsValidCodePage
EnterCriticalSection
GetCurrentProcess
UnhandledExceptionFilter
HeapAlloc
HeapReAlloc
HeapFree
RtlUnwind
WideCharToMultiByte
LCMapStringW
MultiByteToWideChar
GetStringTypeW
WriteConsoleW
OutputDebugStringW
IsProcessorFeaturePresent
SetFilePointer
GetConsoleCP
FlushFileBuffers
user32
GetMessageTime
gdi32
GetBitmapBits
advapi32
InitiateSystemShutdownA
GetFileSecurityW
msimg32
AlphaBlend
Sections
.text Size: 4.2MB - Virtual size: 4.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 39.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 69KB - Virtual size: 69KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ