Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_a476a5e411271e50a52dfb3e0925cdfde3ebb3093064bf67321685e4c083b3f5.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_a476a5e411271e50a52dfb3e0925cdfde3ebb3093064bf67321685e4c083b3f5.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_a476a5e411271e50a52dfb3e0925cdfde3ebb3093064bf67321685e4c083b3f5
-
Size
4.2MB
-
MD5
ee6d99c9fa96724169775768f12a3dd7
-
SHA1
cb02f0956ef7a46431add29bacaaaac89b888afa
-
SHA256
a476a5e411271e50a52dfb3e0925cdfde3ebb3093064bf67321685e4c083b3f5
-
SHA512
5a26f08cfc071c52ca3a0d5700c2cb2abe782e95673b292960620b39ca50e6e557699976cbdc777994df156d9b8a4d5322970f5de34af156fccfb019a59f3ed5
-
SSDEEP
98304:YYqBC8vEbgwsE946rEnJdbcvg89xP0YcaBnD7cS0Acl4Iwjpnm9N4Ii2NWEkv:kT9ENrEHcvN7DLqC7cRrNWEkv
Malware Config
Signatures
Files
-
JaffaCakes118_a476a5e411271e50a52dfb3e0925cdfde3ebb3093064bf67321685e4c083b3f5.exe windows:5 windows x86 arch:x86
804abf6bfd1eb86d699699dd471c7b89
Code Sign
b5:ce:0f:c2:b5:d7:f0:5f:df:3e:cc:1b:38:ee:d5:05Certificate
IssuerPOSTALCODE=10305Not Before15-11-2021 01:47Not After15-11-2022 01:47SubjectPOSTALCODE=1030572:95:7f:cc:f0:04:2e:05:40:fb:43:19:dd:6a:ea:e1:6b:8a:1a:98:bc:8f:20:e4:69:b4:fa:4d:18:0c:1a:49Signer
Actual PE Digest72:95:7f:cc:f0:04:2e:05:40:fb:43:19:dd:6a:ea:e1:6b:8a:1a:98:bc:8f:20:e4:69:b4:fa:4d:18:0c:1a:49Digest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
C:\hetesucepadux72 redixit x.pdb
Imports
kernel32
GetEnvironmentStringsW
GetTickCount
GetConsoleAliasesA
GetSystemTimeAsFileTime
ReadConsoleW
WriteFileGather
SetHandleCount
GlobalAlloc
InitializeCriticalSectionAndSpinCount
Sleep
GetProcessHandleCount
GetSystemWindowsDirectoryA
SetConsoleCP
DeleteVolumeMountPointW
FindNextVolumeW
SetConsoleCursorPosition
GetAtomNameW
GetCPInfoExW
SetLastError
GetProcAddress
VirtualAlloc
BeginUpdateResourceW
EnumDateFormatsExA
GetFirmwareEnvironmentVariableW
LoadLibraryA
WriteConsoleA
UnhandledExceptionFilter
CreateHardLinkW
GetDefaultCommConfigA
SetConsoleCursorInfo
IsDebuggerPresent
RequestDeviceWakeup
QueryPerformanceFrequency
DuplicateHandle
DeleteAtom
lstrcpyW
SetCriticalSectionSpinCount
LCMapStringA
HeapAlloc
GetModuleHandleW
ExitProcess
DecodePointer
GetCommandLineW
HeapSetInformation
GetStartupInfoW
EnterCriticalSection
LeaveCriticalSection
GetStdHandle
GetFileType
DeleteCriticalSection
SetUnhandledExceptionFilter
EncodePointer
TerminateProcess
GetCurrentProcess
WriteFile
GetModuleFileNameW
HeapCreate
IsProcessorFeaturePresent
GetLastError
SetFilePointer
HeapFree
CloseHandle
LoadLibraryW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
GetCurrentThreadId
InterlockedDecrement
FreeEnvironmentStringsW
QueryPerformanceCounter
GetCurrentProcessId
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
RtlUnwind
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
RaiseException
SetStdHandle
FlushFileBuffers
HeapSize
HeapReAlloc
WriteConsoleW
MultiByteToWideChar
LCMapStringW
GetStringTypeW
CreateFileW
user32
GetClipCursor
advapi32
AdjustTokenPrivileges
Sections
.text Size: 4.1MB - Virtual size: 4.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 15KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 110KB - Virtual size: 4.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ