C:\bixunabayimowixip duyucoxabiwafa-gaxuwo.pdb
Static task
static1
Behavioral task
behavioral1
Sample
9acfb27a482a0ac42cd9caf72a24545c_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
9acfb27a482a0ac42cd9caf72a24545c_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
9acfb27a482a0ac42cd9caf72a24545c_JaffaCakes118
-
Size
352KB
-
MD5
9acfb27a482a0ac42cd9caf72a24545c
-
SHA1
b8c2d6639427c9343383ce21eff355974ea550a4
-
SHA256
5134552a33b485a25270b8b78068b22fb46ff20267f92f690ee31a2046b9297d
-
SHA512
edf966e22dba430d66718ae0a7cfc6d2b4c5b92a3eb8092872dbfb8221bc70bcb868c4a044e9323923582b3cb0d4580d7eb81201282119ff3a33c94995b9014f
-
SSDEEP
6144:OqxxwoLIoklLgkgguVHkb/a3hftL4nzgvwZL:zldkl61VEb/a3BtL4nzgA
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 9acfb27a482a0ac42cd9caf72a24545c_JaffaCakes118
Files
-
9acfb27a482a0ac42cd9caf72a24545c_JaffaCakes118.exe windows:5 windows x86 arch:x86
1d601d88e5b5d20552e2979bc6960082
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
FindClose
GetConsoleAliasExesLengthA
GlobalAlloc
GetModuleHandleW
GetSystemDirectoryA
ReadConsoleW
WriteProfileStringA
WriteProfileSectionW
GetProcAddress
LoadLibraryW
GetTempPathA
IsProcessorFeaturePresent
GetTickCount
GetLastError
SetTapeParameters
SetConsoleCP
EnumTimeFormatsW
WaitNamedPipeA
HeapAlloc
GetCommandLineA
HeapSetInformation
GetStartupInfoW
EncodePointer
DecodePointer
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
GetCurrentProcess
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameW
HeapCreate
HeapDestroy
EnterCriticalSection
LeaveCriticalSection
GetModuleFileNameA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
GetCurrentThread
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
SetFilePointer
GetConsoleCP
GetConsoleMode
HeapFree
Sleep
FatalAppExitA
SetConsoleCtrlHandler
FreeLibrary
InterlockedExchange
GetLocaleInfoW
RtlUnwind
MultiByteToWideChar
RaiseException
LCMapStringW
GetStringTypeW
SetStdHandle
WriteConsoleW
HeapReAlloc
HeapSize
FlushFileBuffers
ReadFile
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
CreateFileW
CloseHandle
Exports
Exports
_ExportVars@4
Sections
.text Size: 260KB - Virtual size: 259KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 33KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 684KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vix Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 34KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ