Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_22db69fe2b2118f0aea72ebc66bed1075b694d620773b6077a12c4c301cedb55.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_22db69fe2b2118f0aea72ebc66bed1075b694d620773b6077a12c4c301cedb55.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_22db69fe2b2118f0aea72ebc66bed1075b694d620773b6077a12c4c301cedb55
-
Size
4.1MB
-
MD5
1192b1b85215a23ff2f4647692a549f6
-
SHA1
13c777c1001fc052d1be415a304afd6ad613551b
-
SHA256
22db69fe2b2118f0aea72ebc66bed1075b694d620773b6077a12c4c301cedb55
-
SHA512
30c8a7e28a1c3ccb3b3dce0c96d90099726f8e9572ed9eb0f01839285802b5530149ea46fb73849bb394588ce9c436c97995135b92c621b5e442833ab6d09c19
-
SSDEEP
98304:3sExtuYqq6oXKRNnv/P7wY53P3oujkkqXqweHNFLSRx5:JiHP7wY53P3oujkkq4W5
Malware Config
Signatures
Files
-
JaffaCakes118_22db69fe2b2118f0aea72ebc66bed1075b694d620773b6077a12c4c301cedb55.exe windows:5 windows x86 arch:x86
ffc7a25b05907cf991230f36b2da2f81
Code Sign
64:75:27:96:92:9f:1d:10:df:fb:43:a2:68:78:8e:f1Certificate
IssuerPOSTALCODE=10305Not Before15-10-2022 18:38Not After15-10-2023 18:38SubjectPOSTALCODE=10305de:89:73:bb:71:26:c3:7a:5f:33:08:c3:df:fd:35:81:03:b2:21:53:9e:f1:d8:c5:99:1b:48:09:82:e5:27:81Signer
Actual PE Digestde:89:73:bb:71:26:c3:7a:5f:33:08:c3:df:fd:35:81:03:b2:21:53:9e:f1:d8:c5:99:1b:48:09:82:e5:27:81Digest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
C:\pisijime_21\hetevupaduzek\6\yusilaya20.pdb
Imports
kernel32
TlsGetValue
InterlockedIncrement
SetComputerNameW
MoveFileWithProgressA
IsBadReadPtr
GetNumberFormatA
WaitNamedPipeW
SetCommTimeouts
EnumResourceTypesA
SetFileShortNameW
LoadLibraryW
CreateEventA
SetVolumeMountPointA
GetFileAttributesA
DnsHostnameToComputerNameW
GetConsoleAliasW
SetTimeZoneInformation
GetBinaryTypeA
GetGeoInfoA
IsBadStringPtrA
CreateMutexW
GetLastError
GetProcAddress
VirtualAlloc
HeapSize
GlobalGetAtomNameA
SetFileAttributesA
LoadLibraryA
WriteConsoleA
LocalAlloc
AddAtomW
FoldStringA
EnumResourceTypesW
FindNextFileA
GetModuleHandleA
GetFileAttributesExW
ReadConsoleInputW
GetVersion
LCMapStringA
GetSystemDefaultLangID
GetStartupInfoW
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetModuleHandleW
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
InterlockedDecrement
Sleep
ExitProcess
EnterCriticalSection
LeaveCriticalSection
HeapFree
SetFilePointer
WriteFile
GetStdHandle
GetModuleFileNameA
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
DeleteCriticalSection
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
HeapAlloc
HeapReAlloc
InitializeCriticalSectionAndSpinCount
RtlUnwind
RaiseException
SetStdHandle
FlushFileBuffers
GetConsoleOutputCP
WriteConsoleW
MultiByteToWideChar
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
CreateFileA
CloseHandle
advapi32
DeregisterEventSource
ole32
WriteFmtUserTypeStg
Sections
.text Size: 80KB - Virtual size: 80KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 3.9MB - Virtual size: 3.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 43KB - Virtual size: 4.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ