C:\sidasi-t.pdb
Static task
static1
Behavioral task
behavioral1
Sample
e273d2961670912cbdbe99b588dc8a6a_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e273d2961670912cbdbe99b588dc8a6a_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
e273d2961670912cbdbe99b588dc8a6a_JaffaCakes118
-
Size
14.8MB
-
MD5
e273d2961670912cbdbe99b588dc8a6a
-
SHA1
c9e5f9a212950337db2612cb5b6a78cf4b60086d
-
SHA256
bf6131ae47a3e2c9b08e6b00591795f10c90bfc46c98dbfe8a56122dfaa35574
-
SHA512
0801a0d3d02ab1c197aa12b4cbc81022dd786fc9b81aaed1e879ae824919374fe7c4e0c673a69a61a6dac0457da8a4936afdf81ddcc0427478f9ba217219d8f6
-
SSDEEP
12288:Gc8EvSAInj67ygU57H7zKEVlM++++++++++++++++++++++++++++++++++++++H:G0vSAImHU5
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e273d2961670912cbdbe99b588dc8a6a_JaffaCakes118
Files
-
e273d2961670912cbdbe99b588dc8a6a_JaffaCakes118.exe windows:5 windows x86 arch:x86
123708792297e850a475b64837725c34
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetComputerNameA
SearchPathW
FindFirstFileW
CopyFileExW
TlsGetValue
GetDriveTypeW
GetNumberOfConsoleInputEvents
FindResourceExW
CallNamedPipeA
LoadResource
InterlockedIncrement
InitializeSListHead
CreateDirectoryW
GlobalLock
SetComputerNameW
GetCommProperties
FreeEnvironmentStringsA
SetTapeParameters
GetModuleHandleW
GenerateConsoleCtrlEvent
GetConsoleAliasesLengthA
GetPrivateProfileStringW
GetCommandLineA
GetSystemWow64DirectoryA
CreateDirectoryExW
InitializeCriticalSection
GlobalAlloc
AddRefActCtx
GetVolumeInformationA
ReadFileScatter
GetSystemWindowsDirectoryA
GetSystemTimeAdjustment
GetVersionExW
GlobalFlags
TerminateProcess
IsDBCSLeadByte
ReadFile
GetBinaryTypeW
CompareStringW
lstrlenW
SetConsoleTitleA
LCMapStringA
VerifyVersionInfoW
InterlockedExchange
GetFileSizeEx
GetCurrentDirectoryW
GetProcAddress
SetVolumeLabelW
WriteProfileSectionA
FreeUserPhysicalPages
BuildCommDCBW
OpenWaitableTimerA
GetLocalTime
LoadLibraryA
Process32FirstW
OpenMutexA
SetConsoleOutputCP
AddAtomA
FindAtomA
GetSystemInfo
EnumResourceTypesW
CreateIoCompletionPort
FreeEnvironmentStringsW
EnumResourceNamesA
FindNextFileW
GetConsoleTitleW
RequestWakeupLatency
GetConsoleCursorInfo
ScrollConsoleScreenBufferA
SetCalendarInfoA
GetWindowsDirectoryW
GetProfileSectionW
AreFileApisANSI
DeleteFileA
FlushFileBuffers
GetLastError
MoveFileA
GetStartupInfoA
HeapValidate
IsBadReadPtr
RaiseException
LeaveCriticalSection
EnterCriticalSection
SetStdHandle
GetFileType
WriteFile
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
DeleteCriticalSection
GetModuleFileNameW
SetUnhandledExceptionFilter
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
Sleep
InterlockedDecrement
ExitProcess
GetModuleFileNameA
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
TlsAlloc
TlsSetValue
TlsFree
SetLastError
HeapDestroy
HeapCreate
HeapFree
VirtualFree
HeapAlloc
GetCurrentProcess
UnhandledExceptionFilter
IsDebuggerPresent
HeapSize
HeapReAlloc
VirtualAlloc
GetACP
GetOEMCP
GetCPInfo
IsValidCodePage
InitializeCriticalSectionAndSpinCount
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
MultiByteToWideChar
SetFilePointer
RtlUnwind
DebugBreak
OutputDebugStringA
OutputDebugStringW
LoadLibraryW
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
CreateFileA
CloseHandle
GetModuleHandleA
user32
GetMenuCheckMarkDimensions
GetMenuInfo
GetMenuBarInfo
Sections
.text Size: 202KB - Virtual size: 202KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 45KB - Virtual size: 45KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 4.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 41KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 14.5MB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ