Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_bf5b50a99a9ec46f46e890b0250788bbac91aeb29d098a41b44a26f8f318a6e9.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_bf5b50a99a9ec46f46e890b0250788bbac91aeb29d098a41b44a26f8f318a6e9.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_bf5b50a99a9ec46f46e890b0250788bbac91aeb29d098a41b44a26f8f318a6e9
-
Size
4.4MB
-
MD5
f46eadb64382a4b17c9d842d3d2244ce
-
SHA1
cf4ac175e1653047da45b744313b070aac47f29c
-
SHA256
bf5b50a99a9ec46f46e890b0250788bbac91aeb29d098a41b44a26f8f318a6e9
-
SHA512
e8b3708b8cf860adb725a5b7e93ac01aded61a28144287204e81ded02a7876be3227572be97e87562005373fb579c1945ff3077f4246d68b59cf0cb8e735b163
-
SSDEEP
98304:k4ZVoquqrB3cRtGrrXGDa4wrbns7vjCz9HfCnDoAwdbJY:JVovqN0I2W9Hszjeiwo
Malware Config
Signatures
Files
-
JaffaCakes118_bf5b50a99a9ec46f46e890b0250788bbac91aeb29d098a41b44a26f8f318a6e9.exe windows:5 windows x86 arch:x86
006a79ea8a61231651632116bf97f2d7
Code Sign
5f:5e:03:94:ae:be:20:d8:d4:ac:6f:7d:df:83:24:33Certificate
IssuerPOSTALCODE=10051Not Before27-09-2021 22:23Not After27-09-2022 22:23SubjectPOSTALCODE=1005104:d8:c5:91:50:d1:ce:76:12:c0:d6:80:1d:78:0a:83:c9:b1:fd:36:9c:96:66:bd:72:83:e2:89:6d:f5:6f:31Signer
Actual PE Digest04:d8:c5:91:50:d1:ce:76:12:c0:d6:80:1d:78:0a:83:c9:b1:fd:36:9c:96:66:bd:72:83:e2:89:6d:f5:6f:31Digest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
C:\wefe\tilesoyezonoti\hovum-ragorufil.pdb
Imports
kernel32
GetCommandLineW
HeapReAlloc
GetLocaleInfoA
LoadResource
InterlockedDecrement
GetEnvironmentStringsW
AddConsoleAliasW
SetEvent
OpenSemaphoreA
GetSystemTimeAsFileTime
WriteFileGather
CreateActCtxW
GetEnvironmentStrings
LeaveCriticalSection
GetFileAttributesA
FindNextVolumeW
GetDevicePowerState
GetProcAddress
FreeUserPhysicalPages
VerLanguageNameW
WriteConsoleA
GetProcessId
LocalAlloc
RemoveDirectoryW
WaitForMultipleObjects
EnumResourceTypesW
GetModuleFileNameA
GetModuleHandleA
EraseTape
GetStringTypeW
ReleaseMutex
EndUpdateResourceA
LocalSize
FindFirstVolumeW
FindNextVolumeA
lstrcpyW
HeapAlloc
GetCommandLineA
GetStartupInfoA
DeleteCriticalSection
EnterCriticalSection
HeapFree
VirtualFree
VirtualAlloc
HeapCreate
GetModuleHandleW
Sleep
ExitProcess
WriteFile
GetStdHandle
SetHandleCount
GetFileType
GetLastError
SetFilePointer
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
InitializeCriticalSectionAndSpinCount
RtlUnwind
LoadLibraryA
SetStdHandle
GetConsoleCP
GetConsoleMode
FlushFileBuffers
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
HeapSize
GetConsoleOutputCP
WriteConsoleW
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
CloseHandle
CreateFileA
user32
GetCursorPos
Exports
Exports
@SetViceVariants@12
Sections
.text Size: 4.3MB - Virtual size: 4.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 533KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 93KB - Virtual size: 4.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ