C:\div ramigofivizuhefaci95 mosudunijufu.pdb
Static task
static1
Behavioral task
behavioral1
Sample
ac7bc5c4953f3cdf488f98d2bdfe0bf9_JaffaCakes118.exe
Resource
win7-20240508-en
General
-
Target
ac7bc5c4953f3cdf488f98d2bdfe0bf9_JaffaCakes118
-
Size
268KB
-
MD5
ac7bc5c4953f3cdf488f98d2bdfe0bf9
-
SHA1
8dcc3ffa6aed4b42990d63248db3621e2165d9ac
-
SHA256
9ee54571151efbd253a30211dbe7beaf57aca1b1ed8aae48de72f83d43897c3d
-
SHA512
2a25edece0a2ebb8cf8cae2cad742968b09160eaa7a6cbafb3d83a6f62b642efed041f3d9aacf26135125db491032e2385a1139d6c976e362cae3a4fd78c6117
-
SSDEEP
6144:bjGlumlDoFoiADf3N5uYU6REjMmgJpUgiT:bjG8mOF9C/N5uYUdjMmaziT
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ac7bc5c4953f3cdf488f98d2bdfe0bf9_JaffaCakes118
Files
-
ac7bc5c4953f3cdf488f98d2bdfe0bf9_JaffaCakes118.exe windows:5 windows x86 arch:x86
81ebdeee0fdfc89b5356aa980acad454
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GlobalAlloc
GetBinaryTypeW
GetLastError
PeekConsoleInputW
GetNumberFormatA
VirtualProtect
CreateToolhelp32Snapshot
CloseHandle
GetFileAttributesExA
DebugActiveProcessStop
GetConsoleAliasesLengthW
lstrlenA
LocalAlloc
FindResourceA
EncodePointer
DecodePointer
GetCommandLineW
RaiseException
RtlUnwind
IsDebuggerPresent
IsProcessorFeaturePresent
EnterCriticalSection
LeaveCriticalSection
FlushFileBuffers
WriteFile
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
DeleteCriticalSection
FatalAppExitA
ExitProcess
GetModuleHandleExW
GetProcAddress
AreFileApisANSI
MultiByteToWideChar
HeapSize
HeapFree
HeapAlloc
SetLastError
GetCurrentThread
GetCurrentThreadId
GetProcessHeap
GetStdHandle
GetFileType
GetStartupInfoW
GetModuleFileNameW
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetEnvironmentStringsW
FreeEnvironmentStringsW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
CreateEventW
Sleep
GetCurrentProcess
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetTickCount
GetModuleHandleW
CreateSemaphoreW
SetStdHandle
SetFilePointerEx
WriteConsoleW
SetConsoleCtrlHandler
FreeLibrary
LoadLibraryExW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
HeapReAlloc
GetDateFormatW
GetTimeFormatW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
OutputDebugStringW
GetStringTypeW
CreateFileW
advapi32
RegDeleteKeyA
SetPrivateObjectSecurityEx
RegCreateKeyExW
SetThreadToken
AreAnyAccessesGranted
Sections
.text Size: 138KB - Virtual size: 137KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 104KB - Virtual size: 104KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 78.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ