Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_e44c05bf16df2449d9afd9fa5654ec92bf8454069c65e1f4e49f19674749c227.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_e44c05bf16df2449d9afd9fa5654ec92bf8454069c65e1f4e49f19674749c227.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_e44c05bf16df2449d9afd9fa5654ec92bf8454069c65e1f4e49f19674749c227
-
Size
4.4MB
-
MD5
2e6dacd85a92938e2aedc75626e8ac00
-
SHA1
0e29b82d9db8a24a27996aadd1b6caada267200f
-
SHA256
e44c05bf16df2449d9afd9fa5654ec92bf8454069c65e1f4e49f19674749c227
-
SHA512
11744125347b39580d15329a13f1e829e9e60be8f8d5473ab77c59b2fba196526658357fc1a71fb599395bccea09c10da1ac966872d3856057511af7b4c3836c
-
SSDEEP
98304:fEVlD2yKIgjOTR7zgj96Tn/6Wob9RVJvvuaWSc:f2lKyK1mRXgLWS1huic
Malware Config
Signatures
Files
-
JaffaCakes118_e44c05bf16df2449d9afd9fa5654ec92bf8454069c65e1f4e49f19674749c227.exe windows:5 windows x86 arch:x86
f530acf7acd4a5c8880ba2a4704d4cbb
Code Sign
2b:b4:4d:60:01:82:08:5d:b3:93:8d:3e:93:e4:2b:4dCertificate
IssuerPOSTALCODE=10051Not Before04-09-2021 21:07Not After04-09-2022 21:07SubjectPOSTALCODE=100517a:d6:4b:3b:87:8a:f4:21:ab:47:46:69:e6:8a:a4:c0:ca:b6:45:3e:a3:a4:cb:0b:d2:c7:0a:a8:ff:fb:37:91Signer
Actual PE Digest7a:d6:4b:3b:87:8a:f4:21:ab:47:46:69:e6:8a:a4:c0:ca:b6:45:3e:a3:a4:cb:0b:d2:c7:0a:a8:ff:fb:37:91Digest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
C:\leramuroy\dahetarugah\xem ke.pdb
Imports
kernel32
lstrcpynA
GetDefaultCommConfigW
ReadConsoleA
InterlockedDecrement
SetEnvironmentVariableW
GetEnvironmentStringsW
GetUserDefaultLCID
SetVolumeMountPointW
GetSystemDefaultLCID
EnumCalendarInfoExW
InitializeCriticalSectionAndSpinCount
GetSystemWindowsDirectoryA
LeaveCriticalSection
GetComputerNameExA
ReadFile
GetModuleFileNameW
GetACP
LCMapStringA
VerifyVersionInfoW
InterlockedExchange
GetProcAddress
PeekConsoleInputW
VerLanguageNameA
CopyFileA
GetLocalTime
WriteConsoleA
LocalAlloc
SetConsoleOutputCP
Module32FirstW
GetModuleFileNameA
GetModuleHandleA
QueueUserWorkItem
GetConsoleTitleW
PeekConsoleInputA
ReadConsoleInputW
GetCurrentProcessId
AddConsoleAliasA
FindNextVolumeA
PulseEvent
GetCommandLineW
GetStartupInfoW
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetModuleHandleW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
GetLastError
Sleep
HeapSize
ExitProcess
EnterCriticalSection
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
SetFilePointer
WriteFile
FreeEnvironmentStringsW
HeapCreate
VirtualFree
HeapFree
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
GetCPInfo
GetOEMCP
IsValidCodePage
RaiseException
HeapAlloc
HeapReAlloc
VirtualAlloc
LoadLibraryA
RtlUnwind
SetStdHandle
FlushFileBuffers
GetConsoleOutputCP
WriteConsoleW
MultiByteToWideChar
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
CreateFileA
CloseHandle
gdi32
GetCharWidthFloatW
Sections
.text Size: 4.3MB - Virtual size: 4.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 29.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 123KB - Virtual size: 122KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ