C:\cij\tozakurocaja\heluj.pdb
Static task
static1
Behavioral task
behavioral1
Sample
f3df43ba132bdf2b35e4cff404cf6822_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f3df43ba132bdf2b35e4cff404cf6822_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f3df43ba132bdf2b35e4cff404cf6822_JaffaCakes118
-
Size
10.5MB
-
MD5
f3df43ba132bdf2b35e4cff404cf6822
-
SHA1
1b9098442468602824c455d02e8a168a5beba1f1
-
SHA256
a90655570c4a2d65f49238f26f55c26b9d759fb37e320879a4947925d6d39ae1
-
SHA512
7f9b79450deb76f4f989d06fe521ea4d1bcd7c2fc3d07c97e529b341dc28564db49ba05d99e66a79b6c110d25062c2655618827b02cd9a2de3708bc9728ea9a1
-
SSDEEP
6144:xTNLKg3DE+aImImImImImImImImImImImImImImImImImImImImImImImImImImY:XeO
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource f3df43ba132bdf2b35e4cff404cf6822_JaffaCakes118
Files
-
f3df43ba132bdf2b35e4cff404cf6822_JaffaCakes118.exe windows:5 windows x86 arch:x86
7f519e58768c36b2651aa4c0b9c28c9d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetConsoleAliasesLengthW
WriteConsoleOutputCharacterA
BuildCommDCBAndTimeoutsA
WriteConsoleOutputW
EndUpdateResourceW
InterlockedIncrement
InterlockedDecrement
GetCurrentProcess
GetSystemWindowsDirectoryW
SetEnvironmentVariableW
WaitForSingleObject
GetSystemDefaultLCID
GetModuleHandleW
EnumCalendarInfoExW
SetThreadUILanguage
GetConsoleAliasesLengthA
GetConsoleTitleA
GetEnvironmentStrings
GetConsoleCP
ReadConsoleInputA
SetVolumeMountPointA
lstrcpynW
SetConsoleCursorPosition
GetFileAttributesW
SetTimeZoneInformation
WriteConsoleW
IsBadWritePtr
GetMailslotInfo
lstrcatA
lstrlenW
FlushFileBuffers
InterlockedExchange
FillConsoleOutputCharacterW
ChangeTimerQueueTimer
SetLastError
GetProcAddress
PeekConsoleInputW
EnumDateFormatsExA
CreateTimerQueueTimer
LocalLock
EnterCriticalSection
GlobalGetAtomNameA
ResetEvent
GetLocalTime
LocalAlloc
SetConsoleOutputCP
SetFileApisToANSI
GetOEMCP
GetModuleHandleA
HeapSetInformation
GetCPInfoExA
FindFirstVolumeA
DeleteTimerQueueTimer
GetCurrentProcessId
GetConsoleProcessList
GetModuleFileNameW
GetSystemDefaultLangID
UnhandledExceptionFilter
SetUnhandledExceptionFilter
HeapAlloc
GetCommandLineA
GetStartupInfoA
RaiseException
RtlUnwind
Sleep
ExitProcess
GetLastError
WriteFile
GetStdHandle
GetModuleFileNameA
TerminateProcess
IsDebuggerPresent
HeapFree
DeleteCriticalSection
LeaveCriticalSection
VirtualFree
VirtualAlloc
HeapReAlloc
HeapCreate
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
GetCurrentThreadId
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
LoadLibraryA
InitializeCriticalSectionAndSpinCount
HeapSize
GetCPInfo
GetACP
IsValidCodePage
GetLocaleInfoA
LCMapStringA
MultiByteToWideChar
LCMapStringW
GetStringTypeA
GetStringTypeW
user32
GetAltTabInfoW
Exports
Exports
@SetFirstEverVice@8
Sections
.text Size: 84KB - Virtual size: 84KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 14KB - Virtual size: 40.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 10.4MB - Virtual size: 49KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ