C:\ridajagucov\mane67-futif8\dam ceguz\xivelepeceyi-juyaveyixa.pdb
Static task
static1
Behavioral task
behavioral1
Sample
54447c874ab874aff654868afa6af7a5_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
54447c874ab874aff654868afa6af7a5_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
54447c874ab874aff654868afa6af7a5_JaffaCakes118
-
Size
235KB
-
MD5
54447c874ab874aff654868afa6af7a5
-
SHA1
a2db7d1039488ddb315afd43f844a8a5628a546e
-
SHA256
c0f300da89ce67d5bbbdfec5cda324271c0fd57dca47e8cc2d54c5b11185bb9c
-
SHA512
99f1ca47568769ee026f43f867aeedc275865a7dc600df6cab0b546852a91548b88e5f75410a92bd4bd796999750eefdfbebff6e66e03adeba3852eb68c50493
-
SSDEEP
3072:To4YaWy2vwm6S/2FDjG2hkej26qpOrZEa8eET80j7pCyhcQ3btMGvWceaDpL7Q+P:ToAcd6H126qkrr8eEjP3eLnupL7Q+hJ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 54447c874ab874aff654868afa6af7a5_JaffaCakes118
Files
-
54447c874ab874aff654868afa6af7a5_JaffaCakes118.exe windows:5 windows x86 arch:x86
f04f32f42fdfa69095db11dda219012b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
SetInformationJobObject
lstrlenA
InterlockedDecrement
InitializeSListHead
GetProfileStringW
GetUserDefaultLangID
LoadLibraryW
ReadConsoleInputA
FreeConsole
GetSystemWow64DirectoryW
GetSystemWindowsDirectoryA
HeapDestroy
SetConsoleCursorPosition
GetModuleFileNameW
GetOverlappedResult
GetStartupInfoW
CreateDirectoryA
GetCPInfoExW
GetLastError
GetProcAddress
VirtualAlloc
CreateNamedPipeA
SetStdHandle
SearchPathA
GetPrivateProfileStringA
OpenMutexA
LocalAlloc
MoveFileA
PostQueuedCompletionStatus
FindAtomA
GetPrivateProfileStructA
SetSystemTime
SetEnvironmentVariableA
GetModuleFileNameA
WTSGetActiveConsoleSessionId
HeapSetInformation
FreeEnvironmentStringsW
GetCurrentDirectoryA
OutputDebugStringA
CloseHandle
CreateFileW
WideCharToMultiByte
GetCommandLineA
DecodePointer
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EncodePointer
InterlockedIncrement
GetACP
GetOEMCP
GetCPInfo
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
GetCurrentThreadId
TlsFree
GetModuleHandleW
SetLastError
HeapValidate
IsBadReadPtr
RtlUnwind
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
ExitProcess
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
HeapCreate
WriteFile
IsProcessorFeaturePresent
EnterCriticalSection
LeaveCriticalSection
WriteConsoleW
OutputDebugStringW
LCMapStringW
MultiByteToWideChar
GetStringTypeW
HeapAlloc
HeapReAlloc
HeapSize
HeapQueryInformation
HeapFree
RaiseException
SetFilePointer
GetConsoleCP
GetConsoleMode
FlushFileBuffers
winhttp
WinHttpReadData
Sections
.text Size: 95KB - Virtual size: 94KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 68KB - Virtual size: 4.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 22KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ