D:\ynob\Rimi\osag\Fizox\Exyxese\Vobizo.pdb
Static task
static1
Behavioral task
behavioral1
Sample
a4d8bde5ad011855502faba674c06787_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
a4d8bde5ad011855502faba674c06787_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a4d8bde5ad011855502faba674c06787_JaffaCakes118
-
Size
268KB
-
MD5
a4d8bde5ad011855502faba674c06787
-
SHA1
7e46623f634daf3d0767d14d246cf4cd358783e3
-
SHA256
c274040940d7569c7605ab79bb5612715fde118d29416750608e7c02a9ea6733
-
SHA512
0699ffe7fdd4f975541109a44e27b62b17ddeaa3163a0e8138ba7ec4aa263d8cc2ba906e9ec53ef2bcd36cf04fb6f527635a5bf567c85219d62e3937b8c05887
-
SSDEEP
3072:UitfJFBkJyqf9uXpGvRGqelQ1HIgfegAXQu88ptCFHQRl8ewJcJTcfnbJI4wP8L8:yB9qWRGiHI4AXQuSQn/SfCVPgezmqvV
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a4d8bde5ad011855502faba674c06787_JaffaCakes118
Files
-
a4d8bde5ad011855502faba674c06787_JaffaCakes118.exe windows:4 windows x86 arch:x86
33d782f4ad64add0fa3e4032501bd5e5
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
MoveFileExW
GetCurrentProcessId
GetFileTime
GetDiskFreeSpaceW
WaitForSingleObject
LoadLibraryW
GetProfileStringW
GetModuleHandleW
GetTickCount
QueryPerformanceCounter
HeapSize
VirtualQuery
InterlockedExchange
RtlUnwind
IsBadWritePtr
HeapReAlloc
VirtualAlloc
HeapAlloc
LoadLibraryA
GetSystemTimeAsFileTime
GetModuleHandleA
GetStartupInfoW
GetVersionExA
ExitProcess
GetProcAddress
TerminateProcess
GetCurrentProcess
WriteFile
GetStdHandle
GetModuleFileNameA
UnhandledExceptionFilter
GetModuleFileNameW
FreeEnvironmentStringsA
MultiByteToWideChar
GetEnvironmentStrings
FreeEnvironmentStringsW
GetLastError
GetEnvironmentStringsW
GetCommandLineA
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
HeapDestroy
HeapCreate
VirtualFree
HeapFree
GetCurrentThreadId
user32
LoadMenuW
GetMessagePos
UpdateWindow
GetClassNameW
GetDC
GetAsyncKeyState
EnumChildWindows
ShowWindow
GetWindowTextW
FindWindowW
Sections
.text Size: 64KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 104KB - Virtual size: 103KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 739KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 92KB - Virtual size: 88KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ