C:\xufi6\ceyacim-dujaj_raguzubixiyehogit zuzunururekez93\ho.pdb
Static task
static1
Behavioral task
behavioral1
Sample
ac870d98fcfca054b2c4140bc584c9c6_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
ac870d98fcfca054b2c4140bc584c9c6_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
ac870d98fcfca054b2c4140bc584c9c6_JaffaCakes118
-
Size
268KB
-
MD5
ac870d98fcfca054b2c4140bc584c9c6
-
SHA1
7c49cf18f734afc169914568410bd4fee0a22e4b
-
SHA256
3a12c5a7af5715d62944770c6dd9da366d2f4d20265b9d8f32e79b72705743a0
-
SHA512
7e17e7685219258b0ffde772b76defdb1238fbee9cadca67075648b06c7178dd75776fed277fb25d1028cb25a58a43e5888883c9b450e9988fb3acc55c1dd8ac
-
SSDEEP
6144:ZhWeBAPY6czY/rRPsZdIDgQV7lGLCz1O7i:6eBQHgQ9lZV
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource ac870d98fcfca054b2c4140bc584c9c6_JaffaCakes118
Files
-
ac870d98fcfca054b2c4140bc584c9c6_JaffaCakes118.exe windows:5 windows x86 arch:x86
505d448c8e9abeeee0c8ab99cd830923
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
lstrcatA
GetCalendarInfoW
ReadConsoleInputW
LoadLibraryA
DefineDosDeviceW
DeleteFileA
GlobalAlloc
lstrcpyA
HeapReAlloc
GetDefaultCommConfigA
LoadLibraryW
HeapAlloc
OpenSemaphoreA
GetProcAddress
GetProfileStringW
OpenJobObjectA
CommConfigDialogW
CreateMailslotA
FreeEnvironmentStringsA
GetFileTime
CreateDirectoryExW
IsBadStringPtrW
WriteConsoleW
SetFilePointerEx
lstrcmpA
lstrlenA
GetFirmwareEnvironmentVariableA
FatalExit
EnumResourceTypesA
LockFile
SetProcessShutdownParameters
GetModuleFileNameW
DeviceIoControl
GlobalCompact
GetSystemDefaultLCID
GetFileAttributesExA
GetCurrentDirectoryW
GetPrivateProfileSectionNamesA
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
GetModuleHandleW
GetCurrentProcess
TerminateProcess
GetLastError
SetLastError
RtlUnwind
RaiseException
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
GetStdHandle
WriteFile
GetModuleFileNameA
MultiByteToWideChar
WideCharToMultiByte
ExitProcess
GetModuleHandleExW
GetACP
HeapFree
DecodePointer
CloseHandle
FindClose
FindFirstFileExA
FindNextFileA
IsValidCodePage
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
LCMapStringW
SetStdHandle
GetFileType
GetStringTypeW
GetProcessHeap
HeapSize
FlushFileBuffers
GetConsoleCP
GetConsoleMode
CreateFileW
user32
IsWinEventHookInstalled
advapi32
GetPrivateObjectSecurity
RegQueryValueA
GetSecurityDescriptorControl
RegisterServiceCtrlHandlerW
ClearEventLogA
DeleteAce
ObjectPrivilegeAuditAlarmA
AddAccessDeniedAce
RegOpenKeyExW
RegCreateKeyW
RegEnumValueW
RegQueryValueExW
GetFileSecurityA
Sections
.text Size: 47KB - Virtual size: 47KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 36KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 1.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 512B - Virtual size: 176B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.text Size: 128KB - Virtual size: 127KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 42KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ