Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_f7f319d5bc0feca52698458044be515e78c28ae7350b0d4644681728f4c65b2a.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_f7f319d5bc0feca52698458044be515e78c28ae7350b0d4644681728f4c65b2a.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_f7f319d5bc0feca52698458044be515e78c28ae7350b0d4644681728f4c65b2a
-
Size
4.0MB
-
MD5
36461bbee0e47611df2f657bacabe765
-
SHA1
28e6b17fa46bcf201210db3cf2fae650ab464362
-
SHA256
f7f319d5bc0feca52698458044be515e78c28ae7350b0d4644681728f4c65b2a
-
SHA512
45fdcfdbef11428bfaf82c8b11af2567773eb9250777a35b671bff255e7314e9f89fb54d7588c37b47c190c03a71e817808d262f9d6c75fad31483d7a2e64fb9
-
SSDEEP
98304:dT/SWYAKt9XCVRV+CAAoqA4XFSbXV03AbPkF22L0Q:4fAo9XCVtAAofkFUa3AbPkYiZ
Malware Config
Signatures
Files
-
JaffaCakes118_f7f319d5bc0feca52698458044be515e78c28ae7350b0d4644681728f4c65b2a.exe windows:5 windows x86 arch:x86
1076d4eb9f464e21562d6629e831473b
Code Sign
0c:df:18:02:65:dd:1d:19:71:2a:b8:28:ea:ef:13:e8Certificate
IssuerPOSTALCODE=10305Not Before30-09-2022 09:18Not After30-09-2023 09:18SubjectPOSTALCODE=1030582:f4:b1:3e:14:cf:18:29:c1:6e:bd:4b:55:b7:90:23:86:13:f6:3a:2b:d7:13:65:bd:35:ca:06:f0:f3:53:14Signer
Actual PE Digest82:f4:b1:3e:14:cf:18:29:c1:6e:bd:4b:55:b7:90:23:86:13:f6:3a:2b:d7:13:65:bd:35:ca:06:f0:f3:53:14Digest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
C:\gejimulod41\cosogu.pdb
Imports
kernel32
SetFilePointer
OpenFileMappingA
GetProfileIntA
ReadFile
ReadConsoleW
GetVolumeInformationW
GetComputerNameW
LocalShrink
InterlockedExchange
SetSystemTimeAdjustment
SetLocaleInfoW
FindNextVolumeW
FindCloseChangeNotification
CopyFileExW
MoveFileWithProgressW
GetProfileSectionA
GetProductInfo
LocalSize
FileTimeToDosDateTime
FindFirstChangeNotificationW
GlobalGetAtomNameA
FindResourceExA
GetComputerNameExA
GetModuleHandleW
GetTempPathW
BuildCommDCBAndTimeoutsW
GetProcAddress
LoadLibraryA
GetFileTime
SetConsoleScreenBufferSize
GetPrivateProfileStructA
GetCPInfo
PostQueuedCompletionStatus
GlobalFindAtomW
TerminateJobObject
lstrcpynA
WriteConsoleA
GetBinaryTypeA
GetLastError
GetCommandLineW
InterlockedIncrement
VerifyVersionInfoA
CreateActCtxW
FormatMessageW
GetConsoleAliasA
OpenWaitableTimerA
GetModuleHandleA
LoadLibraryW
EnterCriticalSection
EnumSystemLocalesA
GetStringTypeExW
OpenMutexW
SearchPathA
FindResourceW
GetSystemTimeAdjustment
GetProcessTimes
GetOverlappedResult
GetPrivateProfileStructW
DeleteFiber
InterlockedExchangeAdd
EnumDateFormatsA
InterlockedDecrement
FindActCtxSectionStringW
GetNamedPipeHandleStateW
RegisterWaitForSingleObject
GlobalAlloc
QueryMemoryResourceNotification
SetLastError
GetProcessPriorityBoost
SetMailslotInfo
GetConsoleMode
Sleep
ExitProcess
DeleteFileA
GetCommandLineA
GetStartupInfoA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
GetCurrentThreadId
WriteFile
GetStdHandle
GetModuleFileNameA
DeleteCriticalSection
LeaveCriticalSection
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
InitializeCriticalSectionAndSpinCount
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapCreate
VirtualFree
HeapFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetACP
GetOEMCP
IsValidCodePage
HeapSize
RtlUnwind
GetLocaleInfoA
HeapAlloc
VirtualAlloc
HeapReAlloc
GetStringTypeA
MultiByteToWideChar
GetStringTypeW
LCMapStringA
LCMapStringW
user32
CharUpperW
Sections
.text Size: 58KB - Virtual size: 57KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 3.9MB - Virtual size: 5.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 3.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ