Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_0ba948ee84f3ce4c8a23e92f06541eb3eb2a83b0d29b32174b0adc177dda60cb.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_0ba948ee84f3ce4c8a23e92f06541eb3eb2a83b0d29b32174b0adc177dda60cb.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_0ba948ee84f3ce4c8a23e92f06541eb3eb2a83b0d29b32174b0adc177dda60cb
-
Size
4.2MB
-
MD5
c587b9c868c056e767aa24528f368e79
-
SHA1
cfa8e2404cafdcaf01517293ebbc0f2feb8b0213
-
SHA256
0ba948ee84f3ce4c8a23e92f06541eb3eb2a83b0d29b32174b0adc177dda60cb
-
SHA512
71b4f4ab290d6aa4119250d299c3764bb80faeb22aa3cfa8b490265f53b55870c4eb058a70a58440b91cab34e7d3e6017e69adb9c7404d10f4827814a54177c6
-
SSDEEP
98304:GOzD3mwA97CEgHElJLimv4XWC9f+LVVShAQ79V8etmz38:Rfmv97DgHEbWGCILLs8l8
Malware Config
Signatures
Files
-
JaffaCakes118_0ba948ee84f3ce4c8a23e92f06541eb3eb2a83b0d29b32174b0adc177dda60cb.exe windows:5 windows x86 arch:x86
d447c88e5ba79016e49c5de135738a35
Code Sign
0d:ac:81:ef:a5:16:c1:f8:25:84:fb:4b:b5:bd:cc:47Certificate
IssuerPOSTALCODE=10305Not Before19-11-2021 16:03Not After19-11-2022 16:03SubjectPOSTALCODE=1030587:f9:09:db:a7:f7:da:8b:1f:ce:56:d0:f2:7b:8d:25:0f:6f:64:b4:a8:d0:dd:aa:ca:3d:91:7a:99:d1:02:2eSigner
Actual PE Digest87:f9:09:db:a7:f7:da:8b:1f:ce:56:d0:f2:7b:8d:25:0f:6f:64:b4:a8:d0:dd:aa:ca:3d:91:7a:99:d1:02:2eDigest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
C:\jalezafomowivu.pdb
Imports
kernel32
GetEnvironmentStringsW
WaitForSingleObject
EnumCalendarInfoExW
GetConsoleAliasesLengthA
GetSystemTimeAsFileTime
GetConsoleTitleA
CancelDeviceWakeupRequest
EnumResourceTypesA
GlobalAlloc
GetLocaleInfoW
InitializeCriticalSectionAndSpinCount
SizeofResource
GetProcessHandleCount
SetConsoleCursorPosition
GetFileAttributesW
HeapCompact
GetConsoleAliasesW
GetHandleInformation
GetLastError
GetProcAddress
VirtualAlloc
CopyFileA
GetFirmwareEnvironmentVariableW
GetAtomNameA
LoadLibraryA
CreateHardLinkW
LockResource
WaitForMultipleObjects
GetDefaultCommConfigA
EnumDateFormatsA
FillConsoleOutputAttribute
CloseHandle
DeleteAtom
GlobalAddAtomW
CheckRemoteDebuggerPresent
LCMapStringA
GetSystemDefaultLangID
IsProcessorFeaturePresent
GetStringTypeW
CreateFileW
HeapAlloc
EncodePointer
DecodePointer
GetCommandLineW
HeapSetInformation
GetStartupInfoW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
GetCurrentProcess
HeapFree
EnterCriticalSection
LeaveCriticalSection
SetHandleCount
GetStdHandle
GetFileType
DeleteCriticalSection
GetModuleHandleW
ExitProcess
WriteFile
GetModuleFileNameW
HeapCreate
Sleep
HeapSize
SetFilePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
FreeEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
RtlUnwind
LoadLibraryW
HeapReAlloc
ReadFile
SetStdHandle
FlushFileBuffers
RaiseException
WriteConsoleW
MultiByteToWideChar
LCMapStringW
user32
SetCaretPos
advapi32
CloseEventLog
ole32
CoGetMalloc
winhttp
WinHttpQueryOption
WinHttpOpen
Sections
.text Size: 4.1MB - Virtual size: 4.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 33KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 4.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ