C:\hejadocoma\22-vatecujokixuma heboxiguh-ta.pdb
Static task
static1
Behavioral task
behavioral1
Sample
db53ed475e738f0e7326c6cd4ed50bb5_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
db53ed475e738f0e7326c6cd4ed50bb5_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
db53ed475e738f0e7326c6cd4ed50bb5_JaffaCakes118
-
Size
454KB
-
MD5
db53ed475e738f0e7326c6cd4ed50bb5
-
SHA1
f0c718f59266d967b55c3e23005ab5a4bccf7fb3
-
SHA256
fc6b841e6c753eeebf0d7cc8820cd3c6fcbeb40fc4d2c4d9a8bf9d3f0907fb76
-
SHA512
90077cd219ab3c9f55d49461dd89966a6a1e1e36b902fe95f29560818101980253c726ebab573b2e4cc341eadbfe731a131df28c6fee62d4531668a24e11a1f3
-
SSDEEP
12288:eg7LKJMsjx5gThTPPukDEGheT9mdH8cMB:BKJB5mbum+YH8D
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource db53ed475e738f0e7326c6cd4ed50bb5_JaffaCakes118
Files
-
db53ed475e738f0e7326c6cd4ed50bb5_JaffaCakes118.exe windows:5 windows x86 arch:x86
a3d3c102ccd598a84c1f646602841228
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
lstrlenA
HeapAlloc
EndUpdateResourceW
ReadConsoleA
GetCurrentProcess
SetEvent
SleepEx
BackupSeek
CreateActCtxW
GetEnvironmentStrings
InitAtomTable
HeapDestroy
GetFileAttributesA
FindNextVolumeW
WriteConsoleW
GetModuleFileNameW
ReleaseSemaphore
SetTapePosition
DeactivateActCtx
SetLastError
GetProcAddress
BeginUpdateResourceW
RemoveDirectoryA
GetProcessVersion
LocalAlloc
DebugSetProcessKillOnExit
CreateIoCompletionPort
GetModuleHandleA
VirtualProtect
SetProcessShutdownParameters
GetCurrentProcessId
FindNextVolumeA
lstrcpyA
GetCommandLineW
HeapSetInformation
GetStartupInfoW
EnterCriticalSection
LeaveCriticalSection
DecodePointer
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EncodePointer
TerminateProcess
GetLastError
HeapFree
SetFilePointer
CloseHandle
GetModuleHandleW
ExitProcess
WriteFile
GetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
GetCurrentThreadId
InterlockedDecrement
HeapCreate
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
Sleep
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
WideCharToMultiByte
RtlUnwind
SetStdHandle
GetConsoleCP
GetConsoleMode
FlushFileBuffers
LoadLibraryW
RaiseException
HeapReAlloc
LCMapStringW
MultiByteToWideChar
GetStringTypeW
IsProcessorFeaturePresent
HeapSize
CreateFileW
Exports
Exports
@GetFirstVice@8
Sections
.text Size: 363KB - Virtual size: 362KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 84KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.canere Size: 1024B - Virtual size: 624B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.yikimuj Size: 512B - Virtual size: 23B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 63KB - Virtual size: 95KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ