C:\rezi\dov_diwoj\fekur5_yuzetikekaza wopiliped xarefimakadi1.pdb
Static task
static1
Behavioral task
behavioral1
Sample
5a66d163366de0461ea3a97b192f2f68_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
5a66d163366de0461ea3a97b192f2f68_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
5a66d163366de0461ea3a97b192f2f68_JaffaCakes118
-
Size
388KB
-
MD5
5a66d163366de0461ea3a97b192f2f68
-
SHA1
65f3373423fd2620530f3e0551304ad2ea838063
-
SHA256
b18aad2f2f6dd798cb2e30e96d2825aa9c21c32611a699790319d94b70b92e21
-
SHA512
14a18194a73967f6a9e5720f756efe0247c0aebb0c7413600f8a1a71ea049d8aecfc255789b0b3520ac6cbeffd8e2e5a5b47be55c016bf5db907f8b1feb9d914
-
SSDEEP
6144:0V4oJNYQqbxInrBdHJVjVkM0TJZTNowW6DKxMX5B6WSOGt43GQ2AYH/:0SQNAyrx5VkPdts6GxMXuWxGQ2AY
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5a66d163366de0461ea3a97b192f2f68_JaffaCakes118
Files
-
5a66d163366de0461ea3a97b192f2f68_JaffaCakes118.exe windows:5 windows x86 arch:x86
3053f2a72602e54beffbd9d286711499
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
CreateTimerQueue
SearchPathW
InterlockedIncrement
GetProcessPriorityBoost
GetTickCount
GenerateConsoleCtrlEvent
IsBadReadPtr
GetConsoleAliasesLengthA
SetFileShortNameW
GetSystemTimeAdjustment
GetVersionExW
GetModuleFileNameW
GetEnvironmentVariableA
ExitThread
lstrlenW
GetStartupInfoW
FindFirstFileExA
SetLastError
GetProcAddress
GetLongPathNameA
CopyFileA
CreateMemoryResourceNotification
_hwrite
OpenWaitableTimerA
ProcessIdToSessionId
RegisterWaitForSingleObject
OpenWaitableTimerW
LocalAlloc
MoveFileA
SetConsoleOutputCP
SetCurrentDirectoryW
WriteProfileSectionW
GetModuleHandleA
GetProcessShutdownParameters
FreeEnvironmentStringsW
GetCurrentDirectoryA
CompareStringA
GetFileTime
OutputDebugStringA
GetVersionExA
GetWindowsDirectoryW
DeleteTimerQueueTimer
AddConsoleAliasA
DeleteFileA
CloseHandle
CreateFileW
SetStdHandle
RaiseException
GetCommandLineW
HeapSetInformation
DecodePointer
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EncodePointer
InterlockedDecrement
GetACP
GetOEMCP
GetCPInfo
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
GetCurrentThreadId
TlsFree
GetModuleHandleW
GetLastError
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
ExitProcess
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
HeapValidate
HeapCreate
WriteFile
GetStringTypeW
MultiByteToWideChar
EnterCriticalSection
LeaveCriticalSection
WriteConsoleW
OutputDebugStringW
LoadLibraryW
RtlUnwind
WideCharToMultiByte
LCMapStringW
HeapAlloc
GetModuleFileNameA
HeapReAlloc
HeapSize
HeapQueryInformation
HeapFree
IsProcessorFeaturePresent
SetFilePointer
GetConsoleCP
GetConsoleMode
FlushFileBuffers
user32
GetComboBoxInfo
winhttp
WinHttpWriteData
Sections
.text Size: 306KB - Virtual size: 306KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 18.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 193B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 58KB - Virtual size: 58KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ