Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_a3a7ebd3ea3953516edd3440f6abd0f29d3e4d93f6db21f07486ade3d5ea5b72.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
JaffaCakes118_a3a7ebd3ea3953516edd3440f6abd0f29d3e4d93f6db21f07486ade3d5ea5b72.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_a3a7ebd3ea3953516edd3440f6abd0f29d3e4d93f6db21f07486ade3d5ea5b72
-
Size
4.0MB
-
MD5
95e1f5adb4ecadcbab19d44766ce188d
-
SHA1
7be193ab8f4876f846189ead760d87e73fea5639
-
SHA256
a3a7ebd3ea3953516edd3440f6abd0f29d3e4d93f6db21f07486ade3d5ea5b72
-
SHA512
5e172b5e9c8f92c8b91801966177167c1c7e443d4bcc3cf891456f197cac61256426438b8670c059e8b7980527d3becf5ea7102429be3c4951994d8d097df883
-
SSDEEP
98304:aO8Q6X3ze59uRY0jnCg6C4FcH8pdXBYWLU3suGrpJbT:v8Pnz7D7B+FcH8pzLU8uGHn
Malware Config
Signatures
Files
-
JaffaCakes118_a3a7ebd3ea3953516edd3440f6abd0f29d3e4d93f6db21f07486ade3d5ea5b72.exe windows:5 windows x86 arch:x86
ee783376aeb5a6ccd1e2676f1a5f0e82
Code Sign
30:43:df:75:f3:9e:5c:52:c2:db:12:7d:1d:2e:08:fcCertificate
IssuerPOSTALCODE=10305Not Before21-10-2022 00:17Not After21-10-2023 00:17SubjectPOSTALCODE=1030580:4c:06:a6:42:a8:ff:94:ef:00:04:00:23:c6:cc:87:03:a3:e1:14:fe:0a:50:11:65:7f:dd:c1:84:de:1c:fbSigner
Actual PE Digest80:4c:06:a6:42:a8:ff:94:ef:00:04:00:23:c6:cc:87:03:a3:e1:14:fe:0a:50:11:65:7f:dd:c1:84:de:1c:fbDigest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
C:\dag\vomokufo\68-wuzevodowaf.pdb
Imports
kernel32
GetSystemDefaultLangID
InterlockedIncrement
VerSetConditionMask
GetConsoleAliasA
WaitNamedPipeA
SetFirmwareEnvironmentVariableA
HeapFree
SetComputerNameW
GetFileAttributesExA
GetConsoleAliasesLengthA
TzSpecificLocalTimeToSystemTime
GlobalAlloc
LoadLibraryW
Sleep
GetFileAttributesA
GetConsoleAliasW
GetFileAttributesW
WriteConsoleW
GetGeoInfoA
RaiseException
SetLastError
GetProcAddress
VirtualAlloc
IsValidCodePage
LoadLibraryA
WriteConsoleA
LocalAlloc
AddAtomW
FoldStringA
GetModuleHandleA
CreateMutexA
FindNextFileW
SetFileShortNameA
LCMapStringW
GetStartupInfoW
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetLastError
SetFilePointer
EnterCriticalSection
LeaveCriticalSection
GetModuleHandleW
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
DeleteCriticalSection
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
GetCurrentThreadId
InterlockedDecrement
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetCPInfo
GetACP
GetOEMCP
SetStdHandle
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
FlushFileBuffers
RtlUnwind
InitializeCriticalSectionAndSpinCount
HeapAlloc
HeapReAlloc
LCMapStringA
MultiByteToWideChar
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
GetConsoleOutputCP
HeapSize
CreateFileA
CloseHandle
user32
GetDC
Sections
.text Size: 67KB - Virtual size: 67KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 3.9MB - Virtual size: 3.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 38KB - Virtual size: 4.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ