Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_594d3afb2754288fc49198e317b9ce24304e4ec84dcd5e94ccb0dcd43f0ea640.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_594d3afb2754288fc49198e317b9ce24304e4ec84dcd5e94ccb0dcd43f0ea640.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_594d3afb2754288fc49198e317b9ce24304e4ec84dcd5e94ccb0dcd43f0ea640
-
Size
4.4MB
-
MD5
7fc5e94dcb0bb57b2a8249869bd365c1
-
SHA1
b1d0ff286f3b5097b82f1df9cfdf814300f0efc3
-
SHA256
594d3afb2754288fc49198e317b9ce24304e4ec84dcd5e94ccb0dcd43f0ea640
-
SHA512
610b5c14166eb0e32ef01825b2df63945b122b93810ca61f1a222ab43c0a8209f4e66023af54423047fe419a53a3f8d5f42afd77352c237aeb9cac1b46da6767
-
SSDEEP
98304:IjVpL8bfgD61PtWjEnV/Td6/yv57QkwIA4FKsDx7SBrI7M2DC:IgfE61VWj0z1uzp5KM2DC
Malware Config
Signatures
Files
-
JaffaCakes118_594d3afb2754288fc49198e317b9ce24304e4ec84dcd5e94ccb0dcd43f0ea640.exe windows:5 windows x86 arch:x86
8291759aef0e46c8057b5d52bd12239f
Code Sign
c3:d2:e5:bd:1b:44:ec:0a:90:35:02:35:78:8e:de:21Certificate
IssuerPOSTALCODE=10051Not Before15-09-2021 08:50Not After15-09-2022 08:50SubjectPOSTALCODE=1005134:97:a9:87:b3:ee:7c:ee:4f:68:b5:a0:fa:ce:10:c0:70:1d:21:64:b3:56:30:88:09:02:91:a4:d3:d3:8d:afSigner
Actual PE Digest34:97:a9:87:b3:ee:7c:ee:4f:68:b5:a0:fa:ce:10:c0:70:1d:21:64:b3:56:30:88:09:02:91:a4:d3:d3:8d:afDigest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
C:\jula\vo.pdb
Imports
kernel32
GetLocaleInfoA
LoadResource
ReadConsoleA
InterlockedDecrement
GetCurrentProcess
GetEnvironmentStringsW
GetUserDefaultLCID
FindActCtxSectionStringA
GetUserDefaultLangID
QueryActCtxW
InitializeCriticalSection
ReadConsoleInputA
GetSystemWindowsDirectoryA
LeaveCriticalSection
PulseEvent
VerifyVersionInfoA
WriteConsoleW
GetModuleFileNameW
ReleaseSemaphore
GetConsoleOutputCP
GetProcAddress
PrepareTape
OpenMutexA
LocalAlloc
GlobalGetAtomNameW
WaitForMultipleObjects
SetSystemTime
GetModuleFileNameA
GetModuleHandleA
FindFirstVolumeA
AddConsoleAliasA
GetProfileSectionW
GetCommandLineW
HeapAlloc
GetStartupInfoW
DeleteCriticalSection
EnterCriticalSection
HeapFree
VirtualFree
VirtualAlloc
HeapReAlloc
HeapCreate
GetModuleHandleW
Sleep
ExitProcess
WriteFile
GetStdHandle
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
GetLastError
HeapSize
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RtlUnwind
SetHandleCount
GetFileType
GetStartupInfoA
SetFilePointer
CloseHandle
FreeEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
InitializeCriticalSectionAndSpinCount
LoadLibraryA
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
WideCharToMultiByte
CreateFileA
RaiseException
SetStdHandle
GetConsoleCP
GetConsoleMode
FlushFileBuffers
GetStringTypeA
MultiByteToWideChar
GetStringTypeW
LCMapStringA
LCMapStringW
SetEndOfFile
GetProcessHeap
ReadFile
WriteConsoleA
user32
RealChildWindowFromPoint
Exports
Exports
@SetViceVariants@12
Sections
.text Size: 4.3MB - Virtual size: 4.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 29.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 47KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ