C:\ohojuzequw\Qevyreku\usymawaj\Ugycuvur\Gunihuryb\etylaferys\Nexypi\Ytenugyl\Rewozokuja.pdb
Static task
static1
Behavioral task
behavioral1
Sample
accebd98da8d436bdc1f4270044fa178_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
accebd98da8d436bdc1f4270044fa178_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
accebd98da8d436bdc1f4270044fa178_JaffaCakes118
-
Size
248KB
-
MD5
accebd98da8d436bdc1f4270044fa178
-
SHA1
83b975753664c3038e28262ede7d4d993a6c1919
-
SHA256
b4b46a291f0ab84aa808dc81089db49feb0c5924cdf963991363e2aa07285c3e
-
SHA512
cedd00b915168f331dc2413e203fa6b9c0e48000abc0c6dbb35219e5471b9a6a5fe82d8baac88f42670a3d150f2f718738e15ebc89761f205e2bfdabc2637d98
-
SSDEEP
6144:VHBD2YdVZeF7pZWWB2BjLE4qDfLwwaB/iYOwO:VH12YdVZeF7TWWBkLE4q4BZ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource accebd98da8d436bdc1f4270044fa178_JaffaCakes118
Files
-
accebd98da8d436bdc1f4270044fa178_JaffaCakes118.exe windows:5 windows x86 arch:x86
791a4168456072d4e44633a004f375a2
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
user32
CheckRadioButton
SendDlgItemMessageA
GetClipboardData
DestroyWindow
SetClipboardData
GetIconInfo
SetWindowTextA
SendMessageA
CheckDlgButton
LoadBitmapA
IsDialogMessageA
GetMenu
SetForegroundWindow
ole32
CoInitialize
CoRevokeClassObject
CoTaskMemFree
CoTaskMemAlloc
ws2_32
getpeername
gethostbyname
sendto
socket
getsockname
setsockopt
shutdown
crypt32
CertGetCertificateChain
CertVerifyCertificateChainPolicy
CertCreateCertificateContext
CryptDecodeObject
CertFreeCertificateContext
CertFindCertificateInStore
CryptHashPublicKeyInfo
CertEnumCertificatesInStore
CryptHashCertificate
CertFreeCertificateChain
kernel32
HeapReAlloc
HeapAlloc
CreateFileA
FlushFileBuffers
GetConsoleMode
GetConsoleCP
SetStdHandle
LCMapStringW
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
Sleep
GetTickCount
QueryPerformanceCounter
HeapDestroy
GetStringTypeW
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
WriteConsoleW
SetEndOfFile
GetProcessHeap
CreateFileW
HeapSize
DecodePointer
GetCurrentThread
DuplicateHandle
PeekNamedPipe
GetExitCodeProcess
GetEnvironmentVariableA
ResetEvent
FindFirstChangeNotificationA
DeleteFileA
OpenMutexA
CreateMutexA
GetLocalTime
GetCurrentProcessId
GetFileTime
GetDiskFreeSpaceA
GetTimeFormatA
LoadLibraryA
ExitProcess
MultiByteToWideChar
GetModuleFileNameA
RemoveDirectoryA
TlsGetValue
TlsAlloc
SetTapePosition
VirtualProtect
AddAtomA
GetSystemInfo
GetWindowsDirectoryA
GetLogicalDriveStringsA
GetSystemTimeAsFileTime
GetProcAddress
GetModuleHandleW
GetCommandLineA
HeapSetInformation
GetStartupInfoW
IsProcessorFeaturePresent
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
LeaveCriticalSection
FatalAppExitA
EnterCriticalSection
EncodePointer
GetLastError
SetConsoleCtrlHandler
FreeLibrary
InterlockedExchange
LoadLibraryW
GetLocaleInfoW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
GetCurrentProcess
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
WriteFile
GetStdHandle
GetModuleFileNameW
HeapFree
CloseHandle
ReadFile
SetFilePointer
RtlUnwind
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapCreate
Sections
.text Size: 96KB - Virtual size: 96KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 56KB - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 93KB - Virtual size: 124KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 920B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ