C:\Vogoqonuj\Oragytybo\ocidoc\Emisyj\Udaxymex\Futeniwefa\uwycycevo\Ogunajudac.pdb
Static task
static1
Behavioral task
behavioral1
Sample
a3808d2f38a1bb6955cfbf2da44b12b7_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a3808d2f38a1bb6955cfbf2da44b12b7_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a3808d2f38a1bb6955cfbf2da44b12b7_JaffaCakes118
-
Size
244KB
-
MD5
a3808d2f38a1bb6955cfbf2da44b12b7
-
SHA1
6a9d259cf7d001eab7ab7ca56d8859869a20e374
-
SHA256
eafec1fbebaa3885cc5069251b3df9233eab93d76554d8418ddc5bec9927d4ff
-
SHA512
5190653f25dd5a3c78b6a17b7520b19ea3cd7ddbada1fb4ed3e0bfed2ca7643b18e789160298ce54be7173c83dee5c49a1ca81be9d85da9a94872de3bfebdeb7
-
SSDEEP
6144:DOhQ2jmb9tMV2wl7ZQobHR9AANSr653nXBebFlD:DOpj8fM8wl7ZQ0dSg3XYbFx
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a3808d2f38a1bb6955cfbf2da44b12b7_JaffaCakes118
Files
-
a3808d2f38a1bb6955cfbf2da44b12b7_JaffaCakes118.exe windows:5 windows x86 arch:x86
c04ab15a3c67983abcd39ab3cff23bb7
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
usp10
ScriptCPtoX
ScriptCacheGetHeight
ScriptFreeCache
ScriptGetCMap
ScriptGetFontProperties
ScriptGetGlyphABCWidth
ScriptGetLogicalWidths
ScriptGetProperties
ScriptIsComplex
ScriptLayout
ScriptPlace
ScriptRecordDigitSubstitution
ScriptShape
ScriptStringAnalyse
ScriptStringCPtoX
ScriptStringFree
ScriptStringGetLogicalWidths
ScriptStringGetOrder
ScriptStringOut
ScriptStringValidate
ScriptStringXtoCP
ScriptString_pLogAttr
kernel32
GetFileType
HeapReAlloc
HeapAlloc
GetStringTypeW
MultiByteToWideChar
LCMapStringW
HeapSize
RtlUnwind
Sleep
HeapFree
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
GetCurrentProcess
TerminateProcess
IsDebuggerPresent
UnhandledExceptionFilter
GetLocaleInfoW
LoadLibraryW
InterlockedExchange
FreeLibrary
SetConsoleCtrlHandler
WritePrivateProfileStringA
VirtualProtect
GetWindowsDirectoryA
GetCommandLineA
HeapSetInformation
GetStartupInfoW
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
GetProcAddress
GetModuleHandleW
ExitProcess
DecodePointer
WriteFile
GetStdHandle
GetModuleFileNameW
GetModuleFileNameA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
GetLastError
InterlockedDecrement
GetCurrentThread
HeapCreate
HeapDestroy
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
LeaveCriticalSection
FatalAppExitA
EnterCriticalSection
Sections
.text Size: 67KB - Virtual size: 66KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 108KB - Virtual size: 107KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 65KB - Virtual size: 98KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ