Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_e9a14093ff689a341a0164b2119bdbbed09ece9cd0431e93ed60d0cbfe3ea7af.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_e9a14093ff689a341a0164b2119bdbbed09ece9cd0431e93ed60d0cbfe3ea7af.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_e9a14093ff689a341a0164b2119bdbbed09ece9cd0431e93ed60d0cbfe3ea7af
-
Size
4.1MB
-
MD5
769e250c2a4b1eb90de1a02a17ea52c8
-
SHA1
3385ca6e57943441ac384438cfb9beaa9a6ccdb4
-
SHA256
e9a14093ff689a341a0164b2119bdbbed09ece9cd0431e93ed60d0cbfe3ea7af
-
SHA512
746e7361aea195c1daedde6d1a3952be695bb1518eaae9fef555c70e1dccc7624b40265474f39c58a1c3209bd1faea78fa050253c3c340ae3b07a2207569c6ce
-
SSDEEP
98304:MG8DcEsMVQ3LorE8OS7res864MqUhYuOInfaf/JaDXow54lWU:0cpeQ7orE8R7rV8635/dnfafCXoZl1
Malware Config
Signatures
Files
-
JaffaCakes118_e9a14093ff689a341a0164b2119bdbbed09ece9cd0431e93ed60d0cbfe3ea7af.exe windows:5 windows x86 arch:x86
9f0bc40a49527e7dca0a4b2404ac76f0
Code Sign
58:b3:bc:c9:42:d4:c9:dc:19:c4:5d:20:8a:0f:a0:d9Certificate
IssuerPOSTALCODE=10305Not Before18-10-2022 04:35Not After18-10-2023 04:35SubjectPOSTALCODE=1030580:61:7c:58:7a:bf:72:ff:32:d5:57:df:45:95:bd:8e:45:98:f5:c3:ab:49:cc:32:ff:ac:52:33:1d:07:bf:59Signer
Actual PE Digest80:61:7c:58:7a:bf:72:ff:32:d5:57:df:45:95:bd:8e:45:98:f5:c3:ab:49:cc:32:ff:ac:52:33:1d:07:bf:59Digest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
C:\fiyesahoc\haxupobic yuzirinotuhix.pdb
Imports
kernel32
GetSystemDefaultLangID
CreateMutexW
GetConsoleAliasesLengthW
InterlockedIncrement
VerSetConditionMask
SetComputerNameW
SleepEx
GetFileAttributesExA
IsBadReadPtr
WaitNamedPipeW
SetCommTimeouts
EnumResourceTypesA
SetFileShortNameW
LoadLibraryW
GetFileAttributesA
DnsHostnameToComputerNameW
GetConsoleAliasW
GetBinaryTypeA
GetGeoInfoA
GetCompressedFileSizeA
GetTimeZoneInformation
GetLastError
GetProcAddress
VirtualAlloc
HeapSize
LoadLibraryA
WriteConsoleA
LocalAlloc
CreateEventW
AddAtomA
FoldStringA
FindNextFileA
GetModuleHandleA
FreeEnvironmentStringsW
ReadConsoleInputW
GetVersion
EnumResourceLanguagesW
SetFileAttributesW
LCMapStringW
LocalFileTimeToFileTime
GetStartupInfoW
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetModuleHandleW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
InterlockedDecrement
Sleep
ExitProcess
EnterCriticalSection
LeaveCriticalSection
SetFilePointer
WriteFile
GetStdHandle
GetModuleFileNameA
GetModuleFileNameW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
DeleteCriticalSection
HeapCreate
VirtualFree
HeapFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
HeapAlloc
HeapReAlloc
InitializeCriticalSectionAndSpinCount
RtlUnwind
SetStdHandle
FlushFileBuffers
GetConsoleOutputCP
WriteConsoleW
MultiByteToWideChar
LCMapStringA
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
RaiseException
CreateFileA
CloseHandle
user32
ClientToScreen
Sections
.text Size: 71KB - Virtual size: 70KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 3.9MB - Virtual size: 3.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 41KB - Virtual size: 4.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ