C:\todudisonidowo_yadejowacu\guruxubacu_zuxod_b.pdb
Static task
static1
Behavioral task
behavioral1
Sample
eb03d57fc12537ba28f1576f21244f5f_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
eb03d57fc12537ba28f1576f21244f5f_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
eb03d57fc12537ba28f1576f21244f5f_JaffaCakes118
-
Size
12.8MB
-
MD5
eb03d57fc12537ba28f1576f21244f5f
-
SHA1
f0eeb1fc11e1cf307cb64ad13a07a9f3548e4de6
-
SHA256
0116d741f57967100ef0dc5008fb7a66a9a908da9f18893774884bf5559d31b0
-
SHA512
736029cb30623ab03edbaa2f4c43a6def77cae572114b055844a1d5b9381c1baffcf904d8dad35324db7c5365af10edee51d331c0f2c1f56d497aaac21bfca28
-
SSDEEP
6144:VzhgQYzYuPNgy8Y2OpxOX2QiyKA8ZjWBbuz/emEScSZhoKri:4QIYuPNgy8Y2O+X7sLz/5p3ol
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource eb03d57fc12537ba28f1576f21244f5f_JaffaCakes118
Files
-
eb03d57fc12537ba28f1576f21244f5f_JaffaCakes118.exe windows:5 windows x86 arch:x86
868eccae629fe626e7a9d52d5530b350
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetCommandLineW
EnumResourceNamesW
SetVolumeLabelA
SearchPathW
FindFirstFileW
TlsGetValue
SetLocalTime
GetDriveTypeW
GetNumberOfConsoleInputEvents
CallNamedPipeA
InterlockedIncrement
InterlockedDecrement
InitializeSListHead
GetProfileSectionA
SetComputerNameW
GetComputerNameW
CreateDirectoryExA
GetCommProperties
GetModuleHandleW
GenerateConsoleCtrlEvent
GetConsoleAliasesLengthA
GetPrivateProfileStringW
GetConsoleTitleA
GetWindowsDirectoryA
GetSystemWow64DirectoryA
EnumResourceTypesA
FindResourceExA
GlobalAlloc
AddRefActCtx
GetVolumeInformationA
Sleep
ReadFileScatter
GetConsoleWindow
GetSystemTimeAdjustment
GetVersionExW
GlobalFlags
GetBinaryTypeA
TerminateProcess
IsDBCSLeadByte
ReadFile
CompareStringW
lstrlenW
SetConsoleTitleA
GlobalUnlock
LCMapStringA
VerifyVersionInfoW
CreateDirectoryA
InterlockedExchange
GetFileSizeEx
GetProcAddress
FreeUserPhysicalPages
OpenWaitableTimerA
GetAtomNameA
LoadLibraryA
Process32FirstW
OpenMutexA
SetCalendarInfoW
IsSystemResumeAutomatic
SetConsoleOutputCP
AddAtomW
SetFileApisToANSI
WriteProfileSectionW
GetTapeParameters
GetSystemInfo
GetOEMCP
SetConsoleCursorInfo
CreateIoCompletionPort
FreeEnvironmentStringsW
FindNextFileW
BuildCommDCBA
GetCurrentDirectoryA
CompareStringA
ScrollConsoleScreenBufferA
CopyFileExA
DeleteFileA
GetLastError
MoveFileA
GetCommandLineA
GetStartupInfoA
HeapValidate
IsBadReadPtr
RaiseException
LeaveCriticalSection
EnterCriticalSection
SetStdHandle
GetFileType
WriteFile
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetModuleFileNameW
DeleteCriticalSection
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
ExitProcess
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
TlsAlloc
TlsSetValue
TlsFree
SetLastError
HeapDestroy
HeapCreate
HeapFree
VirtualFree
HeapAlloc
HeapSize
HeapReAlloc
VirtualAlloc
GetACP
GetCPInfo
IsValidCodePage
InitializeCriticalSectionAndSpinCount
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
MultiByteToWideChar
SetFilePointer
RtlUnwind
DebugBreak
OutputDebugStringA
OutputDebugStringW
LoadLibraryW
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
CreateFileA
CloseHandle
FlushFileBuffers
GetModuleHandleA
user32
GetMenuCheckMarkDimensions
GetMenuInfo
GetComboBoxInfo
GetMenuBarInfo
Sections
.text Size: 208KB - Virtual size: 207KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 46KB - Virtual size: 45KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 4.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 34KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 12.5MB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ