C:\gekis90\kexule.pdb
Static task
static1
Behavioral task
behavioral1
Sample
fbbd83534d0b9bc916da1ebef9c218aa_JaffaCakes118.exe
Resource
win7-20231129-en
General
-
Target
fbbd83534d0b9bc916da1ebef9c218aa_JaffaCakes118
-
Size
263KB
-
MD5
fbbd83534d0b9bc916da1ebef9c218aa
-
SHA1
24a97e4dd088072a07259120c18f64d8e3d98793
-
SHA256
1c5eeafca18a55b43c2dea3f4abe2f80f05713a91f0cce411d1d7d491ebc8bd3
-
SHA512
b0946328887171002281a0b535bb92e832a4d51228f1268b68b63e8698e626a0b30909a17c4534d04bb68c98abad071c403c8a13ca9e1ec2c59fdaadd4025cbe
-
SSDEEP
3072:Y7lrbIe0o5OQX0HdpGg+N+Oc/QDlLGKNyOlzs8W3GxVddSkBNmdRYTH9OKT0yB3W:YxXT5Ob9pGH429vNHW32Vm89H
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource fbbd83534d0b9bc916da1ebef9c218aa_JaffaCakes118
Files
-
fbbd83534d0b9bc916da1ebef9c218aa_JaffaCakes118.exe windows:5 windows x86 arch:x86
fed89e16f65d1d3c8d240cd56f909722
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
SetLocalTime
WriteConsoleOutputW
InterlockedIncrement
GetConsoleAliasA
InterlockedDecrement
GetSystemWindowsDirectoryW
SetEnvironmentVariableW
GetEnvironmentStringsW
WaitForSingleObject
SetEvent
GetSystemDefaultLCID
GetModuleHandleW
GetConsoleAliasesLengthA
GetCompressedFileSizeW
CreateActCtxW
InitializeCriticalSection
GetConsoleCP
GetSystemDirectoryW
GetVersionExW
GetFileAttributesA
lstrcpynW
SetConsoleCursorPosition
VerifyVersionInfoA
WritePrivateProfileSectionW
IsBadWritePtr
GetModuleFileNameW
CreateFileW
EnumDateFormatsExW
GetACP
lstrlenW
FlushFileBuffers
InterlockedExchange
GetCPInfoExW
FillConsoleOutputCharacterW
GetLastError
GetProcAddress
PeekConsoleInputW
CreateTimerQueueTimer
LocalLock
GetConsoleDisplayMode
EnterCriticalSection
SetTimerQueueTimer
GlobalGetAtomNameA
WriteConsoleA
LocalAlloc
DnsHostnameToComputerNameA
BeginUpdateResourceA
GetModuleHandleA
HeapSetInformation
EraseTape
GetConsoleTitleW
FindFirstVolumeA
EndUpdateResourceA
ReadConsoleInputW
GetCurrentProcessId
AreFileApisANSI
lstrcatA
LCMapStringW
LCMapStringA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
HeapAlloc
Sleep
ExitProcess
GetCommandLineA
GetStartupInfoA
WriteFile
GetStdHandle
GetModuleFileNameA
DeleteCriticalSection
LeaveCriticalSection
HeapFree
VirtualFree
VirtualAlloc
HeapReAlloc
HeapCreate
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
TerminateProcess
GetCurrentProcess
IsDebuggerPresent
LoadLibraryA
InitializeCriticalSectionAndSpinCount
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
SetHandleCount
GetFileType
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
RtlUnwind
RaiseException
GetCPInfo
GetOEMCP
IsValidCodePage
HeapSize
GetLocaleInfoA
GetStringTypeA
MultiByteToWideChar
GetStringTypeW
user32
RealGetWindowClassA
advapi32
AdjustTokenGroups
Exports
Exports
@GetAnotherVice@12
@SetFirstEverVice@4
Sections
.text Size: 178KB - Virtual size: 177KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 15KB - Virtual size: 40.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 49KB - Virtual size: 49KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ