C:\moyadu.pdb
Static task
static1
Behavioral task
behavioral1
Sample
fd38b33ef2c814530a6334068ede6c9e_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
fd38b33ef2c814530a6334068ede6c9e_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
fd38b33ef2c814530a6334068ede6c9e_JaffaCakes118
-
Size
13.4MB
-
MD5
fd38b33ef2c814530a6334068ede6c9e
-
SHA1
7db500679ab97ade3132968cefb5487341bfc7fa
-
SHA256
68f68b471d96eba7489c49f0764a552bece2be9a88eea0f4caa7cf0b532f242e
-
SHA512
018cb80f9bb521fd0367f47a43ab5f07d8d3ceb1c79a25dbfce82262aeea115eee6bba773c69c7de94cabc267ee1487d090a3afae0c9f638cd8a697b40fd17c0
-
SSDEEP
393216:qHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHH:
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource fd38b33ef2c814530a6334068ede6c9e_JaffaCakes118
Files
-
fd38b33ef2c814530a6334068ede6c9e_JaffaCakes118.exe windows:5 windows x86 arch:x86
169d152bc3371452dbec26f63a5e0c58
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetSystemDefaultLCID
AddRefActCtx
GetCPInfoExA
WriteConsoleInputW
ReadConsoleInputW
GetTapeParameters
WaitCommEvent
GetNumaNodeProcessorMask
GetConsoleCP
VerifyVersionInfoA
WaitNamedPipeW
CreateMutexA
WriteConsoleW
GetLastError
CreateFileA
DeleteFileW
WritePrivateProfileSectionA
GetPrivateProfileSectionW
GetLongPathNameW
SetStdHandle
LoadLibraryW
IsDebuggerPresent
FindFirstVolumeW
WriteFile
BuildCommDCBW
FindActCtxSectionStringW
VerLanguageNameW
SetFileShortNameA
WriteProcessMemory
GetFileAttributesW
SetEvent
IsBadReadPtr
SleepEx
WaitForSingleObject
LoadResource
GetLongPathNameA
FreeConsole
SetConsoleCtrlHandler
SetConsoleTitleW
GetCurrentConsoleFont
SetConsoleTextAttribute
AttachConsole
GetConsoleAliasesLengthW
ReadConsoleA
ReadConsoleOutputW
BuildCommDCBAndTimeoutsA
HeapUnlock
HeapLock
GetAtomNameW
HeapReAlloc
HeapCompact
GetGeoInfoW
GetCurrentProcess
GetProcAddress
GetModuleHandleA
CreateThread
GetVersionExW
GetACP
WaitForMultipleObjects
VerifyVersionInfoW
SetCalendarInfoA
CommConfigDialogA
GetConsoleWindow
FindAtomW
SetFileApisToOEM
GetStringTypeA
HeapSize
GetDiskFreeSpaceA
GetTapePosition
GetConsoleAliasesLengthA
EnumDateFormatsW
GetProfileIntA
InterlockedPopEntrySList
GetCommandLineA
GetStartupInfoA
HeapAlloc
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetModuleHandleW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
ReadFile
TerminateProcess
SetFilePointer
EnterCriticalSection
LeaveCriticalSection
SetHandleCount
GetStdHandle
GetFileType
DeleteCriticalSection
Sleep
ExitProcess
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
HeapCreate
VirtualFree
HeapFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
VirtualAlloc
GetCPInfo
GetOEMCP
IsValidCodePage
RtlUnwind
MultiByteToWideChar
GetConsoleMode
FlushFileBuffers
InitializeCriticalSectionAndSpinCount
LoadLibraryA
GetLocaleInfoA
GetStringTypeW
LCMapStringA
LCMapStringW
WriteConsoleA
GetConsoleOutputCP
CloseHandle
user32
GetAltTabInfoW
advapi32
AdjustTokenPrivileges
MapGenericMask
AreAllAccessesGranted
AdjustTokenGroups
Exports
Exports
@GetFirstVice@0
@GetVice@0
Sections
.text Size: 97KB - Virtual size: 96KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 5.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 13.3MB - Virtual size: 89KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ