C:\doyiha\tasopufacov\hevepi.pdb
Static task
static1
Behavioral task
behavioral1
Sample
e2c2b464a1d9a3c366c2bcb523b5a20b_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e2c2b464a1d9a3c366c2bcb523b5a20b_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
e2c2b464a1d9a3c366c2bcb523b5a20b_JaffaCakes118
-
Size
150KB
-
MD5
e2c2b464a1d9a3c366c2bcb523b5a20b
-
SHA1
273341deb43de67a9274482a2a0397c45c0aff5c
-
SHA256
8c6e8a02877680a2b503cef0b068b452221f95e68f9131a59421ca95c4339eb2
-
SHA512
53e56d9190d7c2a3f2125c11d75f163ec2d2c975ead33ce1dd189ae8432494065daa6d01a21bcfda7014903fc4b84995ac667cb82fc7213b24a40386c91a3dd5
-
SSDEEP
1536:FcbqjNeNMpj0E6pi9e3jHcUYjjf2mqwHwRad/Rt5V6+jE3XzABFnLFBMK48E:wuX9e3TmjjfXfjd/RtCHzgFnLmF
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e2c2b464a1d9a3c366c2bcb523b5a20b_JaffaCakes118
Files
-
e2c2b464a1d9a3c366c2bcb523b5a20b_JaffaCakes118.exe windows:5 windows x86 arch:x86
d9ba9c76f1c1b9698712bcd1010ec021
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetConsoleAliasesLengthW
WriteConsoleOutputCharacterA
WriteConsoleOutputW
EndUpdateResourceW
InterlockedIncrement
GetConsoleAliasA
InterlockedDecrement
GetCurrentProcess
GetSystemWindowsDirectoryW
SetEnvironmentVariableW
WaitForSingleObject
GetSystemDefaultLCID
GetModuleHandleW
EnumCalendarInfoExW
SetThreadUILanguage
GetConsoleTitleA
GetEnvironmentStrings
GetConsoleCP
ReadConsoleInputA
SetVolumeMountPointA
lstrcpynW
SetConsoleCursorPosition
GetFileAttributesW
SetTimeZoneInformation
WriteConsoleW
IsBadWritePtr
GetMailslotInfo
GetModuleFileNameW
lstrcatA
lstrlenW
FlushFileBuffers
VerifyVersionInfoW
InterlockedExchange
FillConsoleOutputCharacterW
ChangeTimerQueueTimer
SetLastError
GetProcAddress
PeekConsoleInputW
EnumDateFormatsExA
CreateTimerQueueTimer
LocalLock
EnterCriticalSection
GlobalGetAtomNameA
ResetEvent
GetLocalTime
LocalAlloc
SetConsoleOutputCP
SetFileApisToANSI
GetOEMCP
GetModuleHandleA
HeapSetInformation
GetCPInfoExA
FindFirstVolumeA
DeleteTimerQueueTimer
GetCurrentProcessId
GetConsoleProcessList
CreateActCtxA
LCMapStringW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
HeapAlloc
Sleep
ExitProcess
GetCommandLineA
GetStartupInfoA
RaiseException
RtlUnwind
GetLastError
WriteFile
GetStdHandle
GetModuleFileNameA
TerminateProcess
IsDebuggerPresent
HeapFree
DeleteCriticalSection
LeaveCriticalSection
VirtualFree
VirtualAlloc
HeapReAlloc
HeapCreate
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
GetCurrentThreadId
LoadLibraryA
InitializeCriticalSectionAndSpinCount
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
GetCPInfo
GetACP
IsValidCodePage
HeapSize
GetLocaleInfoA
GetStringTypeA
MultiByteToWideChar
GetStringTypeW
LCMapStringA
user32
RealGetWindowClassA
Exports
Exports
@SetFirstEverVice@8
Sections
.text Size: 68KB - Virtual size: 68KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 14KB - Virtual size: 40.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 50KB - Virtual size: 49KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ