Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_ffd369555e74df453345aa1fd4b20c400d25d248d69474f1a4f7ad4c68858060.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_ffd369555e74df453345aa1fd4b20c400d25d248d69474f1a4f7ad4c68858060.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_ffd369555e74df453345aa1fd4b20c400d25d248d69474f1a4f7ad4c68858060
-
Size
4.1MB
-
MD5
4e0d3da3241f86736c607f9804df930c
-
SHA1
70c61a23d38c204e94cab31ff2e18fe98353ed9b
-
SHA256
ffd369555e74df453345aa1fd4b20c400d25d248d69474f1a4f7ad4c68858060
-
SHA512
65133cbf1a21440541ff06acf54126203f8b9cae98378f0687ab66e23f7a781c938950f02500b7bb0cf05afb80e8a5907df59091c2a9b2de4c574a8dedd350b5
-
SSDEEP
98304:TddLOTeLcbnpUQEIRj4p+d9B87jxcjHQZyxOPg:BDcbq9IKwY6HQZ7g
Malware Config
Signatures
Files
-
JaffaCakes118_ffd369555e74df453345aa1fd4b20c400d25d248d69474f1a4f7ad4c68858060.exe windows:5 windows x86 arch:x86
a5d52229584f21f040e90c4c81e69da1
Code Sign
60:dc:58:a9:d7:e5:b7:f4:1e:5e:79:10:a4:1f:60:a7Certificate
IssuerPOSTALCODE=10305Not Before09-10-2022 12:56Not After09-10-2023 12:56SubjectPOSTALCODE=10305e4:b5:46:b0:81:1d:fd:fa:8a:c7:cd:c8:e0:87:63:1b:c9:cb:ee:be:4b:47:76:8d:51:1d:fa:3c:f2:80:3c:c9Signer
Actual PE Digeste4:b5:46:b0:81:1d:fd:fa:8a:c7:cd:c8:e0:87:63:1b:c9:cb:ee:be:4b:47:76:8d:51:1d:fa:3c:f2:80:3c:c9Digest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
C:\jiz\dagagekulep5\jir94 husebad\xonacuhozi\bofedizi.pdb
Imports
kernel32
SetConsoleTextAttribute
GetConsoleAliasA
WaitNamedPipeA
HeapFree
SetComputerNameW
GetSystemDefaultLCID
GetFileAttributesExA
EnumCalendarInfoExW
FindResourceExA
SetFileShortNameW
LoadLibraryW
ReadConsoleInputA
CreateEventA
SetVolumeMountPointA
GetConsoleAliasExesLengthW
GetFileAttributesA
WriteConsoleW
GetBinaryTypeA
GetGeoInfoA
GetTimeZoneInformation
GetVolumePathNameA
IsBadStringPtrA
WritePrivateProfileStringW
GetLastError
GetProcAddress
VirtualAlloc
PeekConsoleInputW
CreateTimerQueueTimer
GlobalGetAtomNameA
FindActCtxSectionGuid
SetFileAttributesA
GetPrivateProfileStringA
OpenWaitableTimerA
LoadLibraryA
WriteConsoleA
InterlockedExchangeAdd
OpenWaitableTimerW
LocalAlloc
AddAtomW
FoldStringW
EnumResourceTypesW
GlobalWire
FindNextFileA
GetModuleHandleA
CreateMutexA
FindNextFileW
VirtualProtect
GetShortPathNameW
GetCPInfoExA
SetCalendarInfoA
SetFileShortNameA
GetVersionExA
EnumResourceLanguagesW
GetFileInformationByHandle
DeleteFileA
IsBadHugeReadPtr
SearchPathA
FindFirstChangeNotificationW
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCommandLineA
GetStartupInfoA
RaiseException
RtlUnwind
HeapAlloc
EnterCriticalSection
LeaveCriticalSection
GetModuleHandleW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
SetHandleCount
GetStdHandle
GetFileType
DeleteCriticalSection
SetFilePointer
Sleep
ExitProcess
WriteFile
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetConsoleCP
GetConsoleMode
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
HeapReAlloc
CloseHandle
CreateFileA
InitializeCriticalSectionAndSpinCount
ReadFile
SetStdHandle
FlushFileBuffers
HeapSize
GetConsoleOutputCP
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
SetEndOfFile
GetProcessHeap
user32
ClientToScreen
advapi32
DeregisterEventSource
BackupEventLogW
Sections
.text Size: 92KB - Virtual size: 91KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 3.9MB - Virtual size: 4.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 87KB - Virtual size: 86KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ