Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_5adca936959ed0036a8d694549d9b4ae754a66ad0221bead45e2616531d6fb53.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_5adca936959ed0036a8d694549d9b4ae754a66ad0221bead45e2616531d6fb53.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_5adca936959ed0036a8d694549d9b4ae754a66ad0221bead45e2616531d6fb53
-
Size
4.1MB
-
MD5
ddfda81c2e3b79089742210610a33bb6
-
SHA1
6eeffe970550a31e3a675bd48da718d2656b1cf9
-
SHA256
5adca936959ed0036a8d694549d9b4ae754a66ad0221bead45e2616531d6fb53
-
SHA512
c514462662e9f816e8f0670f3710eae5f101372219ead4c6b2978238f55469875bf84e54674d0571947c11686eff40f32a7b61441bba567e4ab7ee713958c082
-
SSDEEP
98304:5vNmoh7KnooFFuTBHHFRcntaXHHUbRsph3ra2aW7fY/vkiQutqie:lN57KnWBF2taXHHUKLm2aW7Y/vmkqj
Malware Config
Signatures
Files
-
JaffaCakes118_5adca936959ed0036a8d694549d9b4ae754a66ad0221bead45e2616531d6fb53.exe windows:5 windows x86 arch:x86
11341dd96bb97e71cefcf69a59fb99c5
Code Sign
a7:69:e1:59:6c:24:9f:8a:6e:48:df:91:21:1b:29:4aCertificate
IssuerPOSTALCODE=10305Not Before18-10-2022 12:48Not After18-10-2023 12:48SubjectPOSTALCODE=103058f:52:85:cd:92:bf:06:43:00:a7:bc:bd:00:d1:c0:85:16:d3:fe:2a:1c:02:56:31:73:91:ce:bf:aa:92:8a:f9Signer
Actual PE Digest8f:52:85:cd:92:bf:06:43:00:a7:bc:bd:00:d1:c0:85:16:d3:fe:2a:1c:02:56:31:73:91:ce:bf:aa:92:8a:f9Digest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
C:\yog.pdb
Imports
kernel32
GetSystemDefaultLangID
CreateMutexW
GetConsoleAliasesLengthW
VerSetConditionMask
GetConsoleAliasA
InterlockedDecrement
GetFileAttributesExA
WaitNamedPipeW
SetCommTimeouts
EnumResourceTypesA
LoadLibraryW
Sleep
GetFileAttributesA
DnsHostnameToComputerNameW
GetConsoleAliasW
WriteConsoleW
IsBadWritePtr
GetGeoInfoA
GetCompressedFileSizeA
RaiseException
GetLastError
GetProcAddress
VirtualAlloc
HeapSize
SetComputerNameA
LoadLibraryA
WriteConsoleA
LocalAlloc
CreateEventW
AddAtomA
FoldStringA
FindNextFileA
GetModuleHandleA
SetFileShortNameA
ReadConsoleInputW
LCMapStringW
LocalFileTimeToFileTime
GetStartupInfoW
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
SetFilePointer
EnterCriticalSection
LeaveCriticalSection
GetModuleHandleW
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
DeleteCriticalSection
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
HeapCreate
VirtualFree
HeapFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
SetStdHandle
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
FlushFileBuffers
RtlUnwind
InitializeCriticalSectionAndSpinCount
HeapAlloc
HeapReAlloc
LCMapStringA
MultiByteToWideChar
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
GetConsoleOutputCP
CreateFileA
CloseHandle
user32
ClientToScreen
Sections
.text Size: 67KB - Virtual size: 67KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 3.9MB - Virtual size: 3.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 41KB - Virtual size: 4.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ