C:\fibo\potilaxeni hutiradip\mego.pdb
Static task
static1
Behavioral task
behavioral1
Sample
e3bf6d17db40ba1a967df90bc3ba3e4f_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e3bf6d17db40ba1a967df90bc3ba3e4f_JaffaCakes118.exe
Resource
win10v2004-20240319-en
General
-
Target
e3bf6d17db40ba1a967df90bc3ba3e4f_JaffaCakes118
-
Size
415KB
-
MD5
e3bf6d17db40ba1a967df90bc3ba3e4f
-
SHA1
25ae8565ae5eae94e3dd06955b908a3cdc53623f
-
SHA256
f1107d0bce75510a76fc68a917c48afc205459471e22a95dbbd0e52dbd445075
-
SHA512
6e15e220e693c9b217d845a020a1444a4c885e5853dbdc518a045464a40a0436a76fd8fd710e777d2588e1886af8262cf44eef6f508ac7c0139f658fa4fb2012
-
SSDEEP
6144:TqUMjfPJt/I7RnfDmMOkFnjuZgFK+IdJsI5/eXaW0rLFb56dpLN4XQKJ3:+UsJpItjOanSAl6mcGXaW0rN3
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource e3bf6d17db40ba1a967df90bc3ba3e4f_JaffaCakes118
Files
-
e3bf6d17db40ba1a967df90bc3ba3e4f_JaffaCakes118.exe windows:5 windows x86 arch:x86
35df0081a66dd5736a634c136f4b9626
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
CreateTimerQueue
lstrlenA
GetConsoleAliasesLengthW
GetDefaultCommConfigW
HeapAlloc
_lwrite
InterlockedDecrement
GetSystemWindowsDirectoryW
SetEnvironmentVariableW
GetUserDefaultLCID
SetConsoleScreenBufferSize
SetVolumeMountPointW
GetConsoleAliasesLengthA
GetCommandLineA
GetEnvironmentStrings
GetConsoleCP
ReadConsoleInputA
WriteConsoleOutputA
GetComputerNameExA
lstrcpynW
GetFileAttributesW
LocalReAlloc
WriteConsoleW
HeapQueryInformation
GetMailslotInfo
ReadFile
GetModuleFileNameW
GetVolumeNameForVolumeMountPointA
GetConsoleOutputCP
InterlockedExchange
ChangeTimerQueueTimer
SetLastError
GetProcAddress
PeekConsoleInputW
BeginUpdateResourceW
EnumDateFormatsExA
RemoveDirectoryA
EnterCriticalSection
ResetEvent
GetLocalTime
LoadLibraryA
OpenMutexA
IsWow64Process
GlobalGetAtomNameW
GetCurrentConsoleFont
GetOEMCP
GetModuleHandleA
GetConsoleTitleW
BuildCommDCBA
VirtualProtect
GetFileAttributesExW
SetCalendarInfoA
FindFirstVolumeA
ReleaseMutex
GetCurrentProcessId
GetConsoleProcessList
EnumCalendarInfoExA
GetTimeZoneInformation
GetSystemDefaultLangID
CreateFileA
SetStdHandle
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetModuleHandleW
Sleep
ExitProcess
GetStartupInfoA
RaiseException
RtlUnwind
GetLastError
WriteFile
GetStdHandle
GetModuleFileNameA
TerminateProcess
GetCurrentProcess
IsDebuggerPresent
HeapFree
LeaveCriticalSection
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
GetCurrentThreadId
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
VirtualAlloc
HeapReAlloc
GetCPInfo
GetACP
IsValidCodePage
HeapSize
GetLocaleInfoA
GetConsoleMode
FlushFileBuffers
LCMapStringA
MultiByteToWideChar
LCMapStringW
GetStringTypeA
GetStringTypeW
SetFilePointer
CloseHandle
WriteConsoleA
user32
RealGetWindowClassA
Sections
.text Size: 194KB - Virtual size: 194KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 15KB - Virtual size: 40.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 42KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ