C:\zomamugamenaw-fopifeneliwu\kegowayayobuvulid-jovovatos.pdb
Static task
static1
Behavioral task
behavioral1
Sample
f875f387c5a94f5548499d91b4da3059_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f875f387c5a94f5548499d91b4da3059_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
f875f387c5a94f5548499d91b4da3059_JaffaCakes118
-
Size
14.5MB
-
MD5
f875f387c5a94f5548499d91b4da3059
-
SHA1
2afe144d4542d82da97762438c6bbf386f8ebc90
-
SHA256
7446561fb0bf940cd2d9d486234d770f19f4a8714c1558ec90b571a999c53eb2
-
SHA512
a303343870a242531615d5e9b81ffcd015b0796b0d5acd571c5c555be9dad13dd3576de50fa85b2e515aab54676f90f009e1d68237fee06a417210413275f6f1
-
SSDEEP
49152:6OawK7777777777777777777777777777777777777777777777777777777777v:6m
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f875f387c5a94f5548499d91b4da3059_JaffaCakes118
Files
-
f875f387c5a94f5548499d91b4da3059_JaffaCakes118.exe windows:5 windows x86 arch:x86
30ae65cef911353bb8df81640ec4ccdf
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GlobalAlloc
lstrlenW
GetHandleInformation
GetLastError
PeekConsoleInputW
LoadLibraryA
GetCurrencyFormatA
VirtualProtect
GetConsoleCursorInfo
CloseHandle
MoveFileWithProgressW
FormatMessageA
DebugActiveProcess
ProcessIdToSessionId
ExitProcess
EncodePointer
DecodePointer
IsDebuggerPresent
IsProcessorFeaturePresent
GetCommandLineW
RaiseException
RtlUnwind
EnterCriticalSection
LeaveCriticalSection
FlushFileBuffers
WriteFile
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
DeleteCriticalSection
GetModuleHandleExW
GetProcAddress
AreFileApisANSI
MultiByteToWideChar
HeapSize
HeapFree
UnhandledExceptionFilter
SetUnhandledExceptionFilter
SetLastError
InitializeCriticalSectionAndSpinCount
Sleep
GetCurrentProcess
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
GetModuleHandleW
ReadFile
SetFilePointerEx
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetCurrentThreadId
HeapAlloc
GetProcessHeap
GetStdHandle
GetFileType
GetModuleFileNameW
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetStdHandle
WriteConsoleW
LoadLibraryExW
HeapReAlloc
LCMapStringW
ReadConsoleW
GetStringTypeW
OutputDebugStringW
CreateFileW
SetEndOfFile
advapi32
ChangeServiceConfigA
AddAccessDeniedAce
MapGenericMask
AdjustTokenPrivileges
Sections
.text Size: 87KB - Virtual size: 86KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 33KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 92KB - Virtual size: 161KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 14.3MB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ