C:\fos 98 xarur\80\sexozomatit69\fusafaxaluva\hebikigokedujo mole.pdb
Static task
static1
Behavioral task
behavioral1
Sample
f5e82122b54d4d41824619e647ac946d_JaffaCakes118.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
f5e82122b54d4d41824619e647ac946d_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f5e82122b54d4d41824619e647ac946d_JaffaCakes118
-
Size
14.2MB
-
MD5
f5e82122b54d4d41824619e647ac946d
-
SHA1
2e5246a6a5053243e05fb0ec57c53c5f5af4e139
-
SHA256
de6664189711f6d55dd4337ae37167a3feaef197a2a5149d17da8a0a8335f584
-
SHA512
59606a4b3babd11a4b927f0a0e470cdb42d2b784be7f75c8a3f9f23376972aa1b98c47ff2cf7c5c30216298e59ab9fcf9681f259bb39fa931fa9c87cf0cade30
-
SSDEEP
98304:3RoooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooY:
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource f5e82122b54d4d41824619e647ac946d_JaffaCakes118
Files
-
f5e82122b54d4d41824619e647ac946d_JaffaCakes118.exe windows:5 windows x86 arch:x86
951363ab52e1e9075c6884e9d3c909c8
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
HeapReAlloc
UnmapViewOfFile
GetCurrentProcess
SleepEx
ReadConsoleW
FindActCtxSectionStringA
GetEnvironmentStrings
GlobalAlloc
InitAtomTable
HeapDestroy
GetModuleFileNameW
CreateActCtxA
GetOverlappedResult
GetACP
ReleaseSemaphore
SetLastError
GetProcAddress
ResetEvent
GetAtomNameA
WriteConsoleA
GetModuleHandleA
GetProcessShutdownParameters
EraseTape
VirtualProtect
EndUpdateResourceA
FindNextVolumeA
LCMapStringW
lstrcpyA
EncodePointer
DecodePointer
GetCommandLineW
HeapSetInformation
GetStartupInfoW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
GetModuleHandleW
GetCurrentThreadId
GetLastError
InterlockedDecrement
HeapAlloc
EnterCriticalSection
LeaveCriticalSection
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
HeapFree
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
SetFilePointer
CloseHandle
ExitProcess
WriteFile
FreeEnvironmentStringsW
GetEnvironmentStringsW
HeapCreate
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetCPInfo
GetOEMCP
IsValidCodePage
Sleep
WideCharToMultiByte
RtlUnwind
SetStdHandle
GetConsoleCP
GetConsoleMode
FlushFileBuffers
LoadLibraryW
RaiseException
MultiByteToWideChar
GetStringTypeW
IsProcessorFeaturePresent
WriteConsoleW
HeapSize
CreateFileW
Sections
.text Size: 101KB - Virtual size: 101KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 445KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.zelo Size: 1024B - Virtual size: 624B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rakud Size: 512B - Virtual size: 23B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 14.1MB - Virtual size: 102KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ