C:\tujaluvuro\70 dugaw.pdb
Static task
static1
Behavioral task
behavioral1
Sample
ff3b77406525c890ae29230fe87a6cef_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ff3b77406525c890ae29230fe87a6cef_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
ff3b77406525c890ae29230fe87a6cef_JaffaCakes118
-
Size
10.0MB
-
MD5
ff3b77406525c890ae29230fe87a6cef
-
SHA1
f6761513fa5469bb4e9f48ce07e66142286974e2
-
SHA256
1a4e32a5429fbe67927a7c550acca232a2a8dfa02a5b2f2971b47a2a71bb0bdc
-
SHA512
82103d5aa1d20b351d3dea89a7ce8e652ccb2978eb3e6ffd666428f265ba9ec16956688b693d2bfe359fa82c4c70539b2ec67734b39d7a33d5c5006de50965fb
-
SSDEEP
24576:hN7222222222222222222222222222222222222222222222222222222222222A:hS
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ff3b77406525c890ae29230fe87a6cef_JaffaCakes118
Files
-
ff3b77406525c890ae29230fe87a6cef_JaffaCakes118.exe windows:5 windows x86 arch:x86
88e0d4240229a67a4a3fa07eaa1c2b10
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
AddRefActCtx
GetCPInfoExW
WriteConsoleInputW
ReadConsoleInputW
SetTapeParameters
WaitCommEvent
GetNumaProcessorNode
SetConsoleCP
VerifyVersionInfoA
WaitNamedPipeW
GetConsoleAliasesW
WriteConsoleW
SetLastError
CreateFileA
DeleteFileW
WritePrivateProfileSectionW
GetPrivateProfileSectionW
InitializeCriticalSectionAndSpinCount
SetStdHandle
LoadLibraryW
IsDebuggerPresent
GetLongPathNameW
FindFirstVolumeW
WriteFile
GetProfileSectionW
BuildCommDCBA
FindActCtxSectionStringW
SetEndOfFile
SetFileShortNameA
WriteProcessMemory
GetFileAttributesW
GetSystemDefaultLCID
IsBadReadPtr
SleepEx
WaitForSingleObject
WaitForMultipleObjects
GetLastError
SetConsoleCtrlHandler
SetConsoleTitleW
GenerateConsoleCtrlEvent
GetCurrentConsoleFont
AttachConsole
GetConsoleAliasesLengthW
ReadConsoleA
GetProcessHeap
SetConsoleTextAttribute
BuildCommDCBAndTimeoutsA
GetGeoInfoW
GetCurrentProcess
GetProcAddress
GetModuleHandleA
CreateThread
GetVersionExW
GetACP
VerifyVersionInfoW
FindAtomA
SetFileApisToOEM
GetStringTypeA
HeapSize
GetDiskFreeSpaceA
GetTapePosition
EnumDateFormatsW
InterlockedPopEntrySList
SetEvent
GetCommandLineA
GetStartupInfoA
HeapAlloc
EnterCriticalSection
LeaveCriticalSection
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetModuleHandleW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
GetCurrentThreadId
InterlockedDecrement
ReadFile
SetHandleCount
GetStdHandle
GetFileType
DeleteCriticalSection
SetFilePointer
Sleep
ExitProcess
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
HeapCreate
VirtualFree
HeapFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
VirtualAlloc
HeapReAlloc
GetCPInfo
GetOEMCP
IsValidCodePage
RtlUnwind
MultiByteToWideChar
LoadLibraryA
GetConsoleCP
GetConsoleMode
FlushFileBuffers
LCMapStringA
LCMapStringW
GetStringTypeW
GetLocaleInfoA
CloseHandle
WriteConsoleA
GetConsoleOutputCP
user32
GetAltTabInfoW
advapi32
AdjustTokenGroups
AdjustTokenPrivileges
MapGenericMask
AreAllAccessesGranted
Exports
Exports
@GetFirstVice@0
@GetVice@0
Sections
.text Size: 101KB - Virtual size: 100KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 18KB - Virtual size: 5.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 10.0MB - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ