C:\loyeyumafuk xihezesit\zim\miwolavuhejuna_huduzecibav.pdb
Static task
static1
Behavioral task
behavioral1
Sample
c38e9f62c7fe590ec6d1814ee66872c6_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c38e9f62c7fe590ec6d1814ee66872c6_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
c38e9f62c7fe590ec6d1814ee66872c6_JaffaCakes118
-
Size
684KB
-
MD5
c38e9f62c7fe590ec6d1814ee66872c6
-
SHA1
af109be0c125944d51abda184cc274c69966f105
-
SHA256
28f542922c4570020883e48ec635988e4d661fb3a354e11fa16d0717552e46b8
-
SHA512
f0222de8c0416a5caa41fc1fb94042a20c8d0b84c74496dbdea3e94d101562fd8ecbcf763429152bcbd40540822f78183859689a92b5759c675c92adb1924eb9
-
SSDEEP
12288:McojQNZG6iPYW7hCwLuf3D6MX2z7h+2fKKNFbsFwQ19SmVIrPzGbC/q4:cwZGRQ/f3eMqBPLowa9XVIr3/
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c38e9f62c7fe590ec6d1814ee66872c6_JaffaCakes118
Files
-
c38e9f62c7fe590ec6d1814ee66872c6_JaffaCakes118.exe windows:5 windows x86 arch:x86
adc2d74ad17b69fb3b2dcb922692a07d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetFileSize
WriteConsoleInputW
CopyFileExW
SetLocalTime
GetDriveTypeW
SetEndOfFile
GetNumberOfConsoleInputEvents
FindResourceExW
MapUserPhysicalPages
InterlockedIncrement
GetQueuedCompletionStatus
GetCommState
InterlockedDecrement
ScrollConsoleScreenBufferW
SetComputerNameW
CallNamedPipeW
GetModuleHandleW
GetSystemWow64DirectoryA
WriteFileGather
CreateDirectoryExW
TlsSetValue
GlobalAlloc
Sleep
GetSystemTimeAdjustment
GlobalFlags
Beep
VerifyVersionInfoA
IsDBCSLeadByte
ReadFile
CreateFileW
GetBinaryTypeW
GetACP
lstrlenW
GetConsoleOutputCP
VerifyVersionInfoW
CreateDirectoryA
FindFirstFileA
OpenMutexW
GetCurrentDirectoryW
GlobalFix
SetVolumeLabelW
WriteProfileSectionA
ReadFileEx
SetStdHandle
CreateMemoryResourceNotification
SearchPathA
GetPrivateProfileStringA
SetFileApisToOEM
GetLocalTime
GetAtomNameA
Process32FirstW
OpenWaitableTimerW
IsSystemResumeAutomatic
AddAtomW
GetCommMask
SetSystemTime
EnumResourceTypesW
SetConsoleCursorInfo
SetConsoleTitleW
GetModuleHandleA
FreeEnvironmentStringsW
EnumResourceNamesA
GetConsoleTitleW
BuildCommDCBA
CompareStringA
SetCalendarInfoA
GetVersionExA
GetWindowsDirectoryW
GetCurrentProcessId
InterlockedPushEntrySList
GetProfileSectionW
SuspendThread
LCMapStringW
DeleteFileA
GetVolumeInformationW
GetProcAddress
GetCommandLineW
GetStartupInfoW
HeapValidate
IsBadReadPtr
RaiseException
EnterCriticalSection
LeaveCriticalSection
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetModuleFileNameW
DeleteCriticalSection
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetSystemTimeAsFileTime
ExitProcess
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
TlsGetValue
TlsAlloc
TlsFree
SetLastError
GetLastError
HeapDestroy
HeapCreate
HeapFree
VirtualFree
GetModuleFileNameA
WriteFile
HeapAlloc
HeapSize
HeapReAlloc
VirtualAlloc
GetOEMCP
GetCPInfo
IsValidCodePage
RtlUnwind
DebugBreak
OutputDebugStringA
WriteConsoleW
OutputDebugStringW
LoadLibraryW
MultiByteToWideChar
InitializeCriticalSectionAndSpinCount
LoadLibraryA
WideCharToMultiByte
LCMapStringA
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
FlushFileBuffers
GetConsoleCP
GetConsoleMode
SetFilePointer
CloseHandle
WriteConsoleA
CreateFileA
user32
GetMenuInfo
GetComboBoxInfo
GetMenuBarInfo
advapi32
InitiateSystemShutdownW
Exports
Exports
_CallPattern@8
_futurama@4
_hiduk@8
_zabiray@8
Sections
.text Size: 588KB - Virtual size: 588KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 47KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 4.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ