C:\fud fe.pdb
Static task
static1
Behavioral task
behavioral1
Sample
a30c7a6de8282a2d776bf6e239e2bc2f_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
a30c7a6de8282a2d776bf6e239e2bc2f_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
a30c7a6de8282a2d776bf6e239e2bc2f_JaffaCakes118
-
Size
1.6MB
-
MD5
a30c7a6de8282a2d776bf6e239e2bc2f
-
SHA1
c47240326fa525738f57731b9d7974537e4a6d4c
-
SHA256
ea945517814179d5438e9e9373e9d708b2368f8b96a662aa4187bdd95796d9ca
-
SHA512
b1993089c518023689ddf20565e8e403981dea934069f44d9d6f0c31ba307b48eeb1f024af7dbbce369604d6ef4ff7478952c60827394891fe8d2f36614ec2e5
-
SSDEEP
24576:PmJFNtCaaZF3VSG9mDuRopYAsqLdMeQtVxnsM0om0224ZgU:OJFNtCac3V39gLdM1n30P24J
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource a30c7a6de8282a2d776bf6e239e2bc2f_JaffaCakes118
Files
-
a30c7a6de8282a2d776bf6e239e2bc2f_JaffaCakes118.exe windows:5 windows x86 arch:x86
505d448c8e9abeeee0c8ab99cd830923
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
lstrcatA
GetCalendarInfoW
ReadConsoleInputW
LoadLibraryA
DefineDosDeviceW
DeleteFileA
GlobalAlloc
lstrcpyA
HeapReAlloc
GetDefaultCommConfigA
LoadLibraryW
HeapAlloc
OpenSemaphoreA
GetProcAddress
GetProfileStringW
OpenJobObjectA
CommConfigDialogW
CreateMailslotA
FreeEnvironmentStringsA
GetFileTime
CreateDirectoryExW
IsBadStringPtrW
WriteConsoleW
SetFilePointerEx
lstrcmpA
lstrlenA
GetFirmwareEnvironmentVariableA
FatalExit
EnumResourceTypesA
LockFile
SetProcessShutdownParameters
GetModuleFileNameW
DeviceIoControl
GlobalCompact
GetSystemDefaultLCID
GetFileAttributesExA
GetCurrentDirectoryW
GetPrivateProfileSectionNamesA
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
GetModuleHandleW
GetCurrentProcess
TerminateProcess
GetLastError
SetLastError
RtlUnwind
RaiseException
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
GetStdHandle
WriteFile
GetModuleFileNameA
MultiByteToWideChar
WideCharToMultiByte
ExitProcess
GetModuleHandleExW
GetACP
HeapFree
DecodePointer
CloseHandle
FindClose
FindFirstFileExA
FindNextFileA
IsValidCodePage
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
LCMapStringW
SetStdHandle
GetFileType
GetStringTypeW
GetProcessHeap
HeapSize
FlushFileBuffers
GetConsoleCP
GetConsoleMode
CreateFileW
user32
IsWinEventHookInstalled
advapi32
GetPrivateObjectSecurity
RegQueryValueA
GetSecurityDescriptorControl
RegisterServiceCtrlHandlerW
ClearEventLogA
DeleteAce
ObjectPrivilegeAuditAlarmA
AddAccessDeniedAce
RegOpenKeyExW
RegCreateKeyW
RegEnumValueW
RegQueryValueExW
GetFileSecurityA
Sections
.text Size: 47KB - Virtual size: 47KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 36KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 1.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 512B - Virtual size: 176B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.text Size: 1.5MB - Virtual size: 1.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 42KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ