C:\vubaday_xox_jivote.pdb
Static task
static1
Behavioral task
behavioral1
Sample
80deb4864d3e01ae76b938925eabe622_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
80deb4864d3e01ae76b938925eabe622_JaffaCakes118.exe
Resource
win10v2004-20240730-en
General
-
Target
80deb4864d3e01ae76b938925eabe622_JaffaCakes118
-
Size
289KB
-
MD5
80deb4864d3e01ae76b938925eabe622
-
SHA1
611d4557ac5d499afb7445ecf396f6560474e8ea
-
SHA256
f50897115f10331d6e9d08e5366e7f60d743a49edc550d1b087735733e36c9f7
-
SHA512
9ca71aa0713c85a2394d1f5cb91e9753e5488057f5e9d1b701f60fbb40653354b7c39eee9ac018e3c0be4b794e901a9542bdfddd510dac69f976d4b10caee3a0
-
SSDEEP
6144:YPWe8L7O132mpFNoq2Jc22ROhxxpeTr/ekI:De8fO133kqeLDzxp6L
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 80deb4864d3e01ae76b938925eabe622_JaffaCakes118
Files
-
80deb4864d3e01ae76b938925eabe622_JaffaCakes118.exe windows:5 windows x86 arch:x86
ea6e9add4feec4142f4eaf80b256f47a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
HeapReAlloc
GlobalDeleteAtom
GetLocaleInfoA
InterlockedIncrement
GetQueuedCompletionStatus
ReadConsoleA
GetEnvironmentStringsW
SetEvent
GetCommandLineA
CreateActCtxW
GlobalAlloc
CopyFileW
FreeConsole
LeaveCriticalSection
HeapCreate
FindNextVolumeW
GetFileAttributesW
GetModuleFileNameW
lstrlenW
SetConsoleTitleA
FlushFileBuffers
DeactivateActCtx
InterlockedExchange
GetProcAddress
BeginUpdateResourceW
RemoveDirectoryA
VerLanguageNameW
WriteConsoleA
LocalAlloc
SetConsoleWindowInfo
GetTapeParameters
SetEnvironmentVariableA
SetConsoleTitleW
GetModuleHandleA
EraseTape
VirtualProtect
EndUpdateResourceA
FindFirstVolumeW
GetCurrentProcessId
GetPrivateProfileSectionW
FindNextVolumeA
lstrcpyW
CreateFileA
WideCharToMultiByte
InterlockedDecrement
InterlockedCompareExchange
MultiByteToWideChar
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
GetLastError
HeapFree
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapAlloc
GetStartupInfoW
GetCPInfo
RtlUnwind
RaiseException
LCMapStringW
LCMapStringA
GetStringTypeW
VirtualFree
VirtualAlloc
GetModuleHandleW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
SetFilePointer
CloseHandle
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
GetStringTypeA
HeapSize
GetACP
GetOEMCP
IsValidCodePage
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
InitializeCriticalSectionAndSpinCount
SetStdHandle
GetConsoleCP
GetConsoleMode
LoadLibraryA
GetLocaleInfoW
GetConsoleOutputCP
WriteConsoleW
Exports
Exports
@GetFirstVice@8
Sections
.text Size: 139KB - Virtual size: 138KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 22KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 49KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 117KB - Virtual size: 424KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ