C:\zedotuvoho.pdb
Static task
static1
Behavioral task
behavioral1
Sample
fc7ac920ef9ed32fbdf122baf004f71c_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
fc7ac920ef9ed32fbdf122baf004f71c_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
fc7ac920ef9ed32fbdf122baf004f71c_JaffaCakes118
-
Size
149KB
-
MD5
fc7ac920ef9ed32fbdf122baf004f71c
-
SHA1
df0d7134bd78f2001c32f80899c9521b5ebd51fb
-
SHA256
b295592fcfddb1fea5b39dbd3b6d886e04136a172ba0a7b194963cbdf989a199
-
SHA512
4b828ba0d1e16f397c911aa293d2786b81f51f70c7b4b6e6c8c25cbef52936190726590c9af0a56b49a2cb2127e04d0fc612cabc6ce8680d5c52aa30ed94c3ca
-
SSDEEP
3072:gyE7feR0NlsBTjDmpdfjmRe7h0whKT0yB3M:G3NlCi7ez
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource fc7ac920ef9ed32fbdf122baf004f71c_JaffaCakes118
Files
-
fc7ac920ef9ed32fbdf122baf004f71c_JaffaCakes118.exe windows:5 windows x86 arch:x86
3627f9b92d64ac467223f2af87166a04
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
EnumDateFormatsExW
SetLocalTime
WriteConsoleOutputW
InterlockedIncrement
GetConsoleAliasA
InterlockedDecrement
GetSystemWindowsDirectoryW
SetEnvironmentVariableW
GetEnvironmentStringsW
WaitForSingleObject
SetEvent
GetSystemDefaultLCID
GetModuleHandleW
GetConsoleAliasesLengthA
GetCompressedFileSizeW
CreateActCtxW
InitializeCriticalSection
GetConsoleCP
GetSystemDirectoryW
GetVersionExW
GetFileAttributesA
lstrcpynW
SetConsoleCursorPosition
VerifyVersionInfoA
WritePrivateProfileSectionW
IsBadWritePtr
GetModuleFileNameW
CreateFileW
lstrcatA
GetACP
lstrlenW
FlushFileBuffers
InterlockedExchange
GetCPInfoExW
FillConsoleOutputCharacterW
GetLastError
GetProcAddress
PeekConsoleInputW
CreateTimerQueueTimer
LocalLock
GetConsoleDisplayMode
EnterCriticalSection
SetTimerQueueTimer
GlobalGetAtomNameA
WriteConsoleA
LocalAlloc
DnsHostnameToComputerNameA
BeginUpdateResourceA
GetModuleHandleA
HeapSetInformation
EraseTape
GetConsoleTitleW
FindFirstVolumeA
EndUpdateResourceA
ReadConsoleInputW
GetCurrentProcessId
AreFileApisANSI
LCMapStringW
LCMapStringA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
HeapAlloc
Sleep
ExitProcess
GetCommandLineA
GetStartupInfoA
RaiseException
RtlUnwind
WriteFile
GetStdHandle
GetModuleFileNameA
TerminateProcess
GetCurrentProcess
IsDebuggerPresent
HeapFree
DeleteCriticalSection
LeaveCriticalSection
VirtualFree
VirtualAlloc
HeapReAlloc
HeapCreate
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
LoadLibraryA
InitializeCriticalSectionAndSpinCount
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
SetHandleCount
GetFileType
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
GetCPInfo
GetOEMCP
IsValidCodePage
HeapSize
GetLocaleInfoA
GetStringTypeA
MultiByteToWideChar
GetStringTypeW
user32
RealGetWindowClassA
Exports
Exports
@GetAnotherVice@12
@SetFirstEverVice@4
Sections
.text Size: 68KB - Virtual size: 67KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 14KB - Virtual size: 40.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 49KB - Virtual size: 49KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ