C:\fefabujuvipi98\daroxa17\cifogeyaba\58\budipowe85-yaj.pdb
Static task
static1
Behavioral task
behavioral1
Sample
c47e44da6db2d1a427408da5ca970af2_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
c47e44da6db2d1a427408da5ca970af2_JaffaCakes118
-
Size
324KB
-
MD5
c47e44da6db2d1a427408da5ca970af2
-
SHA1
6ebc77734cb4e1ace98b73d1962aa73eb8b7f503
-
SHA256
80a48ecd98c59c948b747df15857a32f997d39970f1a330affdc32178feeb1b6
-
SHA512
eac77982f4bade8acb6f458c44656e0c2b29d6c41881b39f388817471cd5db8a0227d4970e8d019d3a68b296bfdd24c8d975f398dcf9c58d072a835135ebd173
-
SSDEEP
6144:zglICftrs3qhISkOPedrgtiWE+2HlRVx98aC3jzfkEI:slICfiahIrXtH8njzE
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c47e44da6db2d1a427408da5ca970af2_JaffaCakes118
Files
-
c47e44da6db2d1a427408da5ca970af2_JaffaCakes118.exe windows:5 windows x86 arch:x86
ea8aa8524573fdaa0fbe03cd1215da2c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
HeapReAlloc
UnmapViewOfFile
EndUpdateResourceW
GetCurrentProcess
SleepEx
BackupSeek
ReadConsoleW
FindActCtxSectionStringA
GetEnvironmentStrings
GlobalAlloc
InitAtomTable
HeapDestroy
GetModuleFileNameW
CreateActCtxA
GetOverlappedResult
GetACP
ReleaseSemaphore
SetLastError
GetProcAddress
BeginUpdateResourceW
ResetEvent
WriteConsoleA
DebugSetProcessKillOnExit
GetModuleHandleA
GetProcessShutdownParameters
EraseTape
VirtualProtect
FindNextVolumeA
LCMapStringW
lstrcpyA
EncodePointer
DecodePointer
GetCommandLineW
HeapSetInformation
GetStartupInfoW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
GetModuleHandleW
GetCurrentThreadId
GetLastError
InterlockedDecrement
HeapAlloc
EnterCriticalSection
LeaveCriticalSection
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
HeapFree
SetFilePointer
CloseHandle
ExitProcess
WriteFile
GetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
HeapCreate
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetCPInfo
GetOEMCP
IsValidCodePage
Sleep
WideCharToMultiByte
RtlUnwind
SetStdHandle
GetConsoleCP
GetConsoleMode
FlushFileBuffers
LoadLibraryW
RaiseException
MultiByteToWideChar
GetStringTypeW
IsProcessorFeaturePresent
WriteConsoleW
HeapSize
CreateFileW
Sections
.text Size: 187KB - Virtual size: 187KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 445KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.zugel Size: 1024B - Virtual size: 624B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.zogezo Size: 512B - Virtual size: 23B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 108KB - Virtual size: 108KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ