C:\xoliz\hikav\xuxevexogo\yovajavaluhu bimiyupazax jatav.pdb
Static task
static1
Behavioral task
behavioral1
Sample
ec4aacac65a2031e4922899f2b7351b1_JaffaCakes118.exe
Resource
win7-20240215-en
General
-
Target
ec4aacac65a2031e4922899f2b7351b1_JaffaCakes118
-
Size
486KB
-
MD5
ec4aacac65a2031e4922899f2b7351b1
-
SHA1
b5ca22e8a26efd214d891d42de61b74349ae5d5f
-
SHA256
a0a3b26f50b5519b8f86f8648236bd0ac70ff42ad83ecbfd97b33383e9442f16
-
SHA512
6e6fcba88c281b54a3401c495ef7fd1e007952dcbec981bb5df72ea636df9f4eace4a9e285352491829ed0134557388e93714e2f3c32e6f1bda1efc55babbefb
-
SSDEEP
6144:5LUH5TbBUrg2YC+d1pU1BgA+S33Cw3U70V6Ow8To31B38/rwWTKvAQuP9Vc3Lbx9:UlPnd/U5nH80V6KTolB38T+vA87bc
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ec4aacac65a2031e4922899f2b7351b1_JaffaCakes118
Files
-
ec4aacac65a2031e4922899f2b7351b1_JaffaCakes118.exe windows:5 windows x86 arch:x86
6c734257ddf94eda6ae0d5d1c88d7157
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
AddRefActCtx
GetCPInfoExA
WriteConsoleInputA
ReadConsoleInputW
SetTapeParameters
WaitCommEvent
WriteTapemark
SetConsoleCP
VerifyVersionInfoA
WaitNamedPipeW
GetConsoleAliasesW
WriteConsoleW
GetLastError
CreateFileA
DeleteFileW
WritePrivateProfileSectionA
GetPrivateProfileSectionW
InitializeCriticalSectionAndSpinCount
RequestDeviceWakeup
LoadLibraryA
IsDebuggerPresent
GetLongPathNameW
ReadFile
WriteFile
GetProfileSectionA
BuildCommDCBA
FindActCtxSectionStringW
SetEndOfFile
SetFileShortNameW
WriteProcessMemory
GetFileAttributesW
GetSystemDefaultLCID
PulseEvent
SleepEx
WaitForSingleObject
WaitForMultipleObjects
SetConsoleTextAttribute
AllocConsole
SetConsoleCtrlHandler
SetConsoleTitleA
GenerateConsoleCtrlEvent
GetCurrentConsoleFont
SetConsoleWindowInfo
AttachConsole
GetConsoleAliasesLengthW
ReadConsoleA
GetProcessHeap
BuildCommDCBAndTimeoutsA
GetGeoInfoA
GetCurrentProcess
GetProcAddress
GetModuleHandleA
CreateThread
GetProcessHeaps
GetACP
VerifyVersionInfoW
FindAtomA
SetFileApisToOEM
OpenWaitableTimerW
HeapValidate
GetDiskFreeSpaceA
GetTapePosition
EnumDateFormatsW
SetEvent
InterlockedPopEntrySList
GetCommandLineA
GetStartupInfoA
HeapAlloc
EnterCriticalSection
LeaveCriticalSection
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetModuleHandleW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
SetHandleCount
GetStdHandle
GetFileType
DeleteCriticalSection
SetFilePointer
Sleep
ExitProcess
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
HeapCreate
VirtualFree
HeapFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
RaiseException
GetCPInfo
GetOEMCP
IsValidCodePage
VirtualAlloc
HeapReAlloc
RtlUnwind
MultiByteToWideChar
SetStdHandle
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
GetConsoleCP
GetConsoleMode
FlushFileBuffers
HeapSize
CloseHandle
WriteConsoleA
GetConsoleOutputCP
user32
GetAltTabInfoW
advapi32
AdjustTokenPrivileges
MapGenericMask
AreAnyAccessesGranted
AdjustTokenGroups
Exports
Exports
@GetFirstVice@0
@GetVice@0
Sections
.text Size: 386KB - Virtual size: 386KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 19KB - Virtual size: 5.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 79KB - Virtual size: 79KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ