C:\yiwapixa kahowiyezica58_sud19_giy.pdb
Static task
static1
Behavioral task
behavioral1
Sample
f24e01b5427f0548a8b5fcb06a03d6cb_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f24e01b5427f0548a8b5fcb06a03d6cb_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f24e01b5427f0548a8b5fcb06a03d6cb_JaffaCakes118
-
Size
12.0MB
-
MD5
f24e01b5427f0548a8b5fcb06a03d6cb
-
SHA1
c1225c08af8b71beeb8e934038ca10b8edcce686
-
SHA256
f8b2c110a680ee0fad4fc129351ad835fb959bc6ad5c99aa707aec7887affee9
-
SHA512
09d65fa5696a76932abdb0e5e647592a643baa3080205ce1d4eea58123e21d92776c002aba63c68fe1f1bc407963803e2913e5db11e5e80a909cc0ab139191a1
-
SSDEEP
24576:cT8rgnPp+RRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRf:sp+
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource f24e01b5427f0548a8b5fcb06a03d6cb_JaffaCakes118
Files
-
f24e01b5427f0548a8b5fcb06a03d6cb_JaffaCakes118.exe windows:5 windows x86 arch:x86
f9171e3fceb6d8c6fb81cb999790f0d1
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
EnumResourceNamesW
SearchPathW
FindFirstFileW
TlsGetValue
SetLocalTime
GetDriveTypeW
GetNumberOfConsoleInputEvents
FindResourceExW
CallNamedPipeA
InterlockedIncrement
InitializeSListHead
SetComputerNameW
GetComputerNameW
CreateDirectoryExA
GetCommProperties
FreeEnvironmentStringsA
GetModuleHandleW
GenerateConsoleCtrlEvent
GetConsoleAliasesLengthA
GetPrivateProfileStringW
GetConsoleTitleA
GetCommandLineA
GetSystemWow64DirectoryA
EnumResourceTypesA
GlobalAlloc
AddRefActCtx
GetVolumeInformationA
Sleep
ReadFileScatter
GetConsoleWindow
GetSystemTimeAdjustment
GetVersionExW
GlobalFlags
GetBinaryTypeA
TerminateProcess
GetAtomNameW
IsDBCSLeadByte
ReadFile
CompareStringW
lstrlenW
SetConsoleTitleA
GlobalUnlock
LCMapStringA
VerifyVersionInfoW
CreateDirectoryA
InterlockedExchange
GetFileSizeEx
GetCurrentDirectoryW
GetProcAddress
SetVolumeLabelW
FreeUserPhysicalPages
BuildCommDCBW
OpenWaitableTimerA
LoadLibraryA
Process32FirstW
OpenMutexA
SetCalendarInfoW
SetConsoleOutputCP
AddAtomW
SetFileApisToANSI
WriteProfileSectionW
GetTapeParameters
GetSystemInfo
GetOEMCP
CreateIoCompletionPort
FreeEnvironmentStringsW
FindNextFileW
RequestWakeupLatency
GetConsoleCursorInfo
ScrollConsoleScreenBufferA
GetWindowsDirectoryW
GetProfileSectionW
CopyFileExA
DeleteFileA
GetLastError
MoveFileA
GetStartupInfoA
HeapValidate
IsBadReadPtr
RaiseException
LeaveCriticalSection
EnterCriticalSection
SetStdHandle
GetFileType
WriteFile
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetModuleFileNameW
DeleteCriticalSection
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
InterlockedDecrement
ExitProcess
GetModuleFileNameA
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
TlsAlloc
TlsSetValue
TlsFree
SetLastError
HeapDestroy
HeapCreate
HeapFree
VirtualFree
HeapAlloc
HeapSize
HeapReAlloc
VirtualAlloc
GetACP
GetCPInfo
IsValidCodePage
InitializeCriticalSectionAndSpinCount
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
MultiByteToWideChar
SetFilePointer
RtlUnwind
DebugBreak
OutputDebugStringA
OutputDebugStringW
LoadLibraryW
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
CreateFileA
CloseHandle
FlushFileBuffers
GetModuleHandleA
user32
GetMenuCheckMarkDimensions
GetMenuInfo
GetMenuBarInfo
Sections
.text Size: 207KB - Virtual size: 207KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 40KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 4.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 34KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 11.7MB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ