Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_10ba2bc7e5d62f2f5dd12ca0a2d97ecf3dbbee292e72aea68dc8c2b20a7941e7.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_10ba2bc7e5d62f2f5dd12ca0a2d97ecf3dbbee292e72aea68dc8c2b20a7941e7.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_10ba2bc7e5d62f2f5dd12ca0a2d97ecf3dbbee292e72aea68dc8c2b20a7941e7
-
Size
4.0MB
-
MD5
370eca0cd03a5cb7b3b30e311f77c685
-
SHA1
2d62e5260ebf17c9a18b59caed622a2538c65d41
-
SHA256
10ba2bc7e5d62f2f5dd12ca0a2d97ecf3dbbee292e72aea68dc8c2b20a7941e7
-
SHA512
9364f43352a795c2befa493b6071ebef6329483848363be85de336ff66bd26fe0891a2b63cae585c6c5a120508bd03d99a5f95e89160b60c169dee39d52cfc5e
-
SSDEEP
98304:1LrPdlcU7pKJ0V440j8SNTHMd9pu4j+TgPwo5g1o:1LrVlcU7pIrj8mHwpu4j+owoSO
Malware Config
Signatures
Files
-
JaffaCakes118_10ba2bc7e5d62f2f5dd12ca0a2d97ecf3dbbee292e72aea68dc8c2b20a7941e7.exe windows:5 windows x86 arch:x86
620c3a9d5be2ca67bc6b502e7df4a3dd
Code Sign
08:8c:dd:c4:9b:34:9a:fc:b2:98:8e:d3:b8:1c:cc:90Certificate
IssuerPOSTALCODE=10305Not Before21-09-2022 09:25Not After21-09-2023 09:25SubjectPOSTALCODE=103058c:e8:9b:44:b2:1b:93:f9:0a:28:66:01:a7:01:a6:c0:da:3c:dd:e5:14:a6:4c:05:e2:c8:19:6a:45:2e:f5:31Signer
Actual PE Digest8c:e8:9b:44:b2:1b:93:f9:0a:28:66:01:a7:01:a6:c0:da:3c:dd:e5:14:a6:4c:05:e2:c8:19:6a:45:2e:f5:31Digest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
C:\baya-50\hexuh\ligecake45\guxo.pdb
Imports
kernel32
GetPrivateProfileIntA
InterlockedDecrement
GetSystemTimeAdjustment
VerSetConditionMask
SetLocaleInfoA
FindNextVolumeW
FindNextChangeNotification
CopyFileExW
MoveFileWithProgressW
GetProfileSectionA
VerifyVersionInfoW
LocalFlags
GetProcessPriorityBoost
FindFirstChangeNotificationA
GlobalGetAtomNameW
FindResourceExA
GetComputerNameExW
GetModuleHandleA
GetTempPathW
BuildCommDCBAndTimeoutsA
GetProcAddress
LoadLibraryA
ExitProcess
HeapAlloc
InitializeCriticalSection
EnumSystemLocalesW
DisableThreadLibraryCalls
OpenMutexA
FileTimeToLocalFileTime
GetProcessShutdownParameters
FindResourceW
VerifyVersionInfoA
GetOverlappedResult
DeleteFiber
EnumDateFormatsA
VirtualUnlock
GetCurrencyFormatA
GetTapeParameters
GetPrivateProfileStructW
GetAtomNameA
FlushConsoleInputBuffer
SetProcessAffinityMask
GetCPInfoExW
SetThreadContext
lstrlenA
SetConsoleCtrlHandler
QueryInformationJobObject
lstrcpynA
WriteConsoleW
GetBinaryTypeW
GetProfileSectionW
SearchPathA
GetCommandLineA
GetCalendarInfoW
GetConsoleTitleA
CreateActCtxW
FormatMessageA
GetModuleHandleW
GetConsoleAliasA
InterlockedIncrement
LoadLibraryW
InterlockedExchange
FindActCtxSectionGuid
SetConsoleCursorInfo
RegisterWaitForSingleObject
GlobalAlloc
GetFileType
SetLastError
SetProcessPriorityBoost
GetMailslotInfo
GetSystemDefaultUILanguage
GetLastError
HeapReAlloc
GetStartupInfoA
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
HeapCreate
VirtualFree
HeapFree
VirtualAlloc
SetUnhandledExceptionFilter
Sleep
WriteFile
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
GetCurrentThreadId
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
IsDebuggerPresent
InitializeCriticalSectionAndSpinCount
RtlUnwind
LCMapStringA
MultiByteToWideChar
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
HeapSize
user32
CharUpperW
Sections
.text Size: 45KB - Virtual size: 44KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 3.9MB - Virtual size: 5.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 35KB - Virtual size: 3.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ