Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_91e7a8a26637dd380263a8be0afab319674c789e0348b0ec330f4b9dcdeb4a93.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_91e7a8a26637dd380263a8be0afab319674c789e0348b0ec330f4b9dcdeb4a93.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_91e7a8a26637dd380263a8be0afab319674c789e0348b0ec330f4b9dcdeb4a93
-
Size
4.0MB
-
MD5
bd0e9ed2aaf9de6b6a734b6672784e79
-
SHA1
85c4216095db3c1589403c0def1584340fefb0bc
-
SHA256
91e7a8a26637dd380263a8be0afab319674c789e0348b0ec330f4b9dcdeb4a93
-
SHA512
a8998f7fecfd21af2393fe703f2a84a753e3e30dadce692e348af5f73b0d1145eea79b5d25c28e6cbb2cdae8bc2ce8722c0ea8bd8deb8a7e13f9df5966d6b022
-
SSDEEP
98304:fqCcuxnEfyHC4Cjlb7w2wmorqTdveU1kDJc:9DtPCjJ7w2JxdWUAC
Malware Config
Signatures
Files
-
JaffaCakes118_91e7a8a26637dd380263a8be0afab319674c789e0348b0ec330f4b9dcdeb4a93.exe windows:5 windows x86 arch:x86
d7d5eb29f8cc9aa72be1b48a07c02672
Code Sign
2d:2f:a4:e2:06:43:05:11:c1:58:f7:d0:9d:15:68:abCertificate
IssuerPOSTALCODE=10305Not Before26-09-2022 22:49Not After26-09-2023 22:49SubjectPOSTALCODE=10305ca:53:a7:94:c0:38:ee:ad:59:92:8c:6c:ef:e5:7b:0c:eb:43:2d:46:7c:2d:16:4a:1c:62:bc:02:27:e8:9d:51Signer
Actual PE Digestca:53:a7:94:c0:38:ee:ad:59:92:8c:6c:ef:e5:7b:0c:eb:43:2d:46:7c:2d:16:4a:1c:62:bc:02:27:e8:9d:51Digest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
C:\belej.pdb
Imports
kernel32
LocalShrink
InterlockedExchange
GetSystemTimeAdjustment
SetLocaleInfoW
FindNextVolumeW
FindNextChangeNotification
CopyFileExA
MoveFileWithProgressW
GetProfileSectionW
VerifyVersionInfoA
LocalSize
FileTimeToDosDateTime
FindFirstChangeNotificationW
GlobalGetAtomNameA
FindResourceExA
GetComputerNameExA
GetModuleHandleW
GetTempPathW
BuildCommDCBAndTimeoutsW
GetProcAddress
LoadLibraryA
GetFileTime
SetConsoleScreenBufferSize
VirtualLock
GetPrivateProfileStructA
GetWindowsDirectoryW
GetCPInfoExA
PostQueuedCompletionStatus
GlobalFindAtomA
TerminateJobObject
lstrcpynA
WriteConsoleA
GetBinaryTypeA
GetLastError
SearchPathW
GetCommandLineW
InterlockedIncrement
GetCalendarInfoA
GetConsoleTitleA
CreateActCtxW
FormatMessageW
GetConsoleAliasA
OpenWaitableTimerA
GetModuleHandleA
LoadLibraryW
TerminateProcess
GetSystemDirectoryW
EnterCriticalSection
EnumSystemLocalesA
GetStringTypeExW
OpenMutexW
TransactNamedPipe
SearchPathA
FindResourceW
GetProcessTimes
GetOverlappedResult
GetPrivateProfileStructW
DeleteFiber
InterlockedExchangeAdd
EnumDateFormatsA
InterlockedDecrement
FindActCtxSectionStringW
SetConsoleCursorPosition
RegisterWaitForSingleObject
GlobalAlloc
QueryMemoryResourceNotification
SetLastError
GetProcessPriorityBoost
GetMailslotInfo
SetFilePointer
GetConsoleMode
DeleteFileA
GetCommandLineA
GetStartupInfoA
HeapAlloc
SetUnhandledExceptionFilter
Sleep
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
DeleteCriticalSection
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
GetCurrentThreadId
HeapCreate
VirtualFree
HeapFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetCurrentProcess
UnhandledExceptionFilter
IsDebuggerPresent
LeaveCriticalSection
VirtualAlloc
HeapReAlloc
InitializeCriticalSectionAndSpinCount
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
RtlUnwind
HeapSize
GetLocaleInfoA
LCMapStringA
MultiByteToWideChar
LCMapStringW
GetStringTypeA
GetStringTypeW
user32
CharUpperW
Sections
.text Size: 45KB - Virtual size: 44KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 3.9MB - Virtual size: 5.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 3.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ