Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_bdb3af800e61fdecefbf2b56879f87197e3d35abbaa045080cd8b4279cb55bd7.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_bdb3af800e61fdecefbf2b56879f87197e3d35abbaa045080cd8b4279cb55bd7.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_bdb3af800e61fdecefbf2b56879f87197e3d35abbaa045080cd8b4279cb55bd7
-
Size
4.1MB
-
MD5
878eb78a11d544af79d6cd16a96788ec
-
SHA1
ab99781d618f5ebd45a8a3cff0d83341d8560fe4
-
SHA256
bdb3af800e61fdecefbf2b56879f87197e3d35abbaa045080cd8b4279cb55bd7
-
SHA512
f28c4911a3aa9455e60e8b773c0270f7922f185522dca9bfef0aed733e982c1ed1684f93ed5f132f0630e09182d79cac4a6ab166229024de7f2ca88142dcd49d
-
SSDEEP
98304:nAw+2eirgg4AbmxgPYuE6rs7cR1dYqPYSW5qClqvVWNz:jvRgvxgPYsrsgLdYqPY95ivo
Malware Config
Signatures
Files
-
JaffaCakes118_bdb3af800e61fdecefbf2b56879f87197e3d35abbaa045080cd8b4279cb55bd7.exe windows:5 windows x86 arch:x86
ca312dc63bf418e898d33fe8e60ee03c
Code Sign
77:26:b1:1f:80:dd:00:62:d2:57:0d:fb:ad:a9:07:57Certificate
IssuerPOSTALCODE=10407Not Before04-11-2022 13:30Not After04-11-2023 13:30SubjectPOSTALCODE=10407a4:69:0e:5e:8c:f0:28:86:87:fd:84:58:ce:2b:39:b1:3c:9f:f0:49:74:15:a2:7c:cf:69:e1:f5:5a:05:d2:32Signer
Actual PE Digesta4:69:0e:5e:8c:f0:28:86:87:fd:84:58:ce:2b:39:b1:3c:9f:f0:49:74:15:a2:7c:cf:69:e1:f5:5a:05:d2:32Digest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
C:\kufa jurolefi16 vemo.pdb
Imports
kernel32
SetThreadContext
WriteConsoleInputW
SetFilePointer
lstrlenA
GetConsoleAliasExesA
MapUserPhysicalPages
InterlockedIncrement
OpenJobObjectA
SetComputerNameW
AddConsoleAliasW
GetModuleHandleW
GetConsoleAliasesLengthA
GetGeoInfoW
WaitNamedPipeW
TlsSetValue
GlobalAlloc
LoadLibraryW
ReadConsoleInputA
CopyFileW
GetConsoleAliasExesLengthW
GetFileAttributesA
CreateMutexW
ReadFile
GetSystemDirectoryA
GetVolumePathNameA
LCMapStringA
GetConsoleAliasesW
GetLastError
GetProcAddress
VirtualAlloc
EnumSystemCodePagesW
LoadLibraryA
UnhandledExceptionFilter
LocalAlloc
CreateHardLinkW
CreateEventW
WriteProfileSectionW
FindAtomA
FindNextFileA
GetFileAttributesExW
LCMapStringW
WriteConsoleW
GetSystemDefaultLangID
Sleep
ExitProcess
GetStartupInfoW
TerminateProcess
GetCurrentProcess
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapAlloc
EnterCriticalSection
LeaveCriticalSection
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
RaiseException
TlsGetValue
TlsAlloc
TlsFree
SetLastError
GetCurrentThreadId
InterlockedDecrement
WriteFile
GetModuleFileNameA
InitializeCriticalSectionAndSpinCount
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
HeapCreate
VirtualFree
HeapFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
HeapReAlloc
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
MultiByteToWideChar
RtlUnwind
SetStdHandle
GetModuleHandleA
HeapSize
GetLocaleInfoA
WriteConsoleA
GetConsoleOutputCP
GetStringTypeA
GetStringTypeW
FlushFileBuffers
CreateFileA
CloseHandle
gdi32
GetTextExtentExPointA
Sections
.text Size: 69KB - Virtual size: 68KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4.0MB - Virtual size: 43.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 25KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 26KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ