Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_a2d2a7677b7e0306f02ba20acc0495e72c7e6f0aa073c56df3bef313750dfda8.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_a2d2a7677b7e0306f02ba20acc0495e72c7e6f0aa073c56df3bef313750dfda8.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_a2d2a7677b7e0306f02ba20acc0495e72c7e6f0aa073c56df3bef313750dfda8
-
Size
4.0MB
-
MD5
2101a63d83efc8b15fc7780928807fb0
-
SHA1
7ad7d41a83ed34c6cceef888e969bfcd053f9c87
-
SHA256
a2d2a7677b7e0306f02ba20acc0495e72c7e6f0aa073c56df3bef313750dfda8
-
SHA512
9fa619c82df85a572d6177e4dde387ad6222e60a587f600a938174591fb7b0ae34f3fd15dad9a6ec21aa30971b543e8442a51d24e86c2f1a220da2fb4afd090a
-
SSDEEP
98304:JrXjZ1wF2Mqs8BxOq+88oxELl0RGVNuXF6l5DqTHS3VNMt2MD:NXjZ1FrHBP+ho+sYHDqTHIi
Malware Config
Signatures
Files
-
JaffaCakes118_a2d2a7677b7e0306f02ba20acc0495e72c7e6f0aa073c56df3bef313750dfda8.exe windows:5 windows x86 arch:x86
fde0517e64b0a7c2ff3801bc28f267be
Code Sign
a0:94:5d:80:b2:60:75:19:a3:0e:36:cb:df:41:3b:84Certificate
IssuerPOSTALCODE=10305Not Before23-10-2022 11:13Not After23-10-2023 11:13SubjectPOSTALCODE=1030561:92:9a:ac:e5:da:49:a0:55:3f:ed:54:85:75:8d:dc:30:7c:75:bb:80:07:9a:9b:05:a5:f3:74:97:c3:c7:48Signer
Actual PE Digest61:92:9a:ac:e5:da:49:a0:55:3f:ed:54:85:75:8d:dc:30:7c:75:bb:80:07:9a:9b:05:a5:f3:74:97:c3:c7:48Digest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
C:\vemuzadojodun_ye.pdb
Imports
kernel32
GetConsoleAliasesLengthW
GetConsoleAliasExesA
LoadResource
VerSetConditionMask
InterlockedDecrement
WaitNamedPipeA
SetFirmwareEnvironmentVariableA
GetSystemDefaultLCID
GetGeoInfoW
GlobalAlloc
SetFileShortNameW
GetFileAttributesA
GetConsoleAliasW
GetFileAttributesW
WriteConsoleW
lstrlenW
RaiseException
LCMapStringA
OpenMutexW
SetLastError
GetProcAddress
FindVolumeMountPointClose
VirtualAlloc
IsValidCodePage
SetComputerNameA
LoadLibraryA
LocalAlloc
AddAtomA
FoldStringA
GetModuleHandleA
CreateMutexA
FreeEnvironmentStringsW
FindNextFileW
GetFileAttributesExW
TerminateJobObject
LCMapStringW
GetStartupInfoW
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
GetLastError
SetFilePointer
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EnterCriticalSection
LeaveCriticalSection
HeapFree
CloseHandle
GetModuleHandleW
Sleep
ExitProcess
WriteFile
GetModuleFileNameA
GetModuleFileNameW
GetEnvironmentStringsW
GetCommandLineW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
GetCurrentThreadId
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
InitializeCriticalSectionAndSpinCount
SetStdHandle
RtlUnwind
GetCPInfo
GetACP
GetOEMCP
HeapAlloc
HeapReAlloc
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
FlushFileBuffers
MultiByteToWideChar
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
WriteConsoleA
GetConsoleOutputCP
HeapSize
CreateFileA
Sections
.text Size: 67KB - Virtual size: 66KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 3.9MB - Virtual size: 43.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 23KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 25KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ