Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_402dff4b9a40194a9b31a541c012399b2bb37e654db9b1a5ebc93c42f71da3b1.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_402dff4b9a40194a9b31a541c012399b2bb37e654db9b1a5ebc93c42f71da3b1.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_402dff4b9a40194a9b31a541c012399b2bb37e654db9b1a5ebc93c42f71da3b1
-
Size
4.4MB
-
MD5
81c1d95073bce8663b645de0ef9d87b5
-
SHA1
1d5e81be6089557d237ba251d912ad3b5b4b99ad
-
SHA256
402dff4b9a40194a9b31a541c012399b2bb37e654db9b1a5ebc93c42f71da3b1
-
SHA512
166d45ef370e2f9e8b6c030e299c56fe150cece873a88d2d7edc738de200dbd962709daa3d1eb3c9eca85671397fff5ce5148996e236d2e5b37e4351be0ea1a0
-
SSDEEP
98304:FRrT3mO26bRh3RJ16R4xYCVO80baHEiMFOXv9tse4FSyWw2UU7EpKpkwiNSi:FEsXBJwWxJ70bCse4xWwhfSiNt
Malware Config
Signatures
Files
-
JaffaCakes118_402dff4b9a40194a9b31a541c012399b2bb37e654db9b1a5ebc93c42f71da3b1.exe windows:5 windows x86 arch:x86
668261688af1c36e49fbdd48700cd1eb
Code Sign
9c:4f:1e:b4:f2:a8:87:01:75:8f:1e:e0:6b:f6:43:cfCertificate
IssuerPOSTALCODE=10051Not Before15-09-2021 12:03Not After15-09-2022 12:03SubjectPOSTALCODE=10051b3:e4:23:a6:c1:49:a9:e7:d6:7a:9e:cc:61:95:bf:22:2b:06:57:32:ad:98:f6:fd:ae:34:12:84:c5:a0:8a:fcSigner
Actual PE Digestb3:e4:23:a6:c1:49:a9:e7:d6:7a:9e:cc:61:95:bf:22:2b:06:57:32:ad:98:f6:fd:ae:34:12:84:c5:a0:8a:fcDigest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
C:\tul.pdb
Imports
kernel32
GetLocaleInfoA
LoadResource
ReadConsoleA
InterlockedDecrement
GetCurrentProcess
GetEnvironmentStringsW
FindActCtxSectionStringA
GetUserDefaultLangID
QueryActCtxW
InitializeCriticalSection
GetSystemWindowsDirectoryA
LeaveCriticalSection
PulseEvent
WriteConsoleW
GetModuleFileNameW
ReleaseSemaphore
GetProcAddress
DisableThreadLibraryCalls
PrepareTape
OpenMutexA
LocalAlloc
SetConsoleOutputCP
GlobalGetAtomNameW
WaitForMultipleObjects
SetSystemTime
GetModuleFileNameA
GetModuleHandleA
FindFirstVolumeA
AddConsoleAliasA
VerifyVersionInfoA
GetCommandLineW
GetLastError
HeapReAlloc
HeapAlloc
GetModuleHandleW
Sleep
ExitProcess
GetStartupInfoW
EnterCriticalSection
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RtlUnwind
HeapFree
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
SetFilePointer
HeapCreate
VirtualFree
VirtualAlloc
CloseHandle
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
WriteFile
LoadLibraryA
InitializeCriticalSectionAndSpinCount
FreeEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
CreateFileA
RaiseException
SetStdHandle
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
FlushFileBuffers
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
HeapSize
SetEndOfFile
GetProcessHeap
MultiByteToWideChar
ReadFile
WriteConsoleA
GetConsoleOutputCP
GetStringTypeA
GetStringTypeW
LCMapStringA
LCMapStringW
user32
RealChildWindowFromPoint
Exports
Exports
@SetFirstEverVice@8
@SetViceVariants@12
Sections
.text Size: 4.3MB - Virtual size: 4.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 29.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 47KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ