C:\cunopulocucol6 yeyigif.pdb
Static task
static1
Behavioral task
behavioral1
Sample
bd8b35afe36ca1b434627fa781f1c48f_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
bd8b35afe36ca1b434627fa781f1c48f_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
bd8b35afe36ca1b434627fa781f1c48f_JaffaCakes118
-
Size
237KB
-
MD5
bd8b35afe36ca1b434627fa781f1c48f
-
SHA1
54f94dc11d6a7fbdb3d124be3769875d5dd79d97
-
SHA256
d5c4a838fd041d4b593b95c48394f8f2c277fd4bf9f3a507706c3fa5743f6ef6
-
SHA512
a8b525d89131c0f26f4123f32f6740352af4fca9dce8fc73d17039fbcdfbda3e68a3bae17a1c22eecd7170fdc80f069b3521ebeb47b9f7768132689cdd91ceea
-
SSDEEP
3072:TunvVXpMJCkh0wY4HryaXqBN26IzUikgtZtvfTp6JCR2YhvOFQ1ith:wvjM50wYo+0eM3v16JCsIOJf
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource bd8b35afe36ca1b434627fa781f1c48f_JaffaCakes118
Files
-
bd8b35afe36ca1b434627fa781f1c48f_JaffaCakes118.exe windows:5 windows x86 arch:x86
86d15733aa97ed9105fa04cbd1d6b71a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
OpenSemaphoreA
IsProcessInJob
GetModuleHandleA
ReadConsoleInputW
LoadLibraryA
DefineDosDeviceW
GlobalAlloc
DeleteFileW
HeapReAlloc
GetDefaultCommConfigA
HeapAlloc
GetCurrentDirectoryW
GetPrivateProfileSectionNamesW
GetProcAddress
VirtualAllocEx
GlobalFix
GetProfileStringW
OpenJobObjectA
CreateMailslotA
FreeEnvironmentStringsA
GetFirmwareEnvironmentVariableW
GetFileTime
CreateDirectoryExW
WriteConsoleW
FlushFileBuffers
lstrcmpA
lstrlenA
IsBadStringPtrA
FatalExit
LockFile
VirtualAlloc
DeviceIoControl
EnumResourceTypesW
GetStdHandle
GetSystemDefaultLCID
GetFileAttributesExA
GetProcessShutdownParameters
GetCalendarInfoA
GetModuleFileNameA
IsProcessorFeaturePresent
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
GetModuleHandleW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
GetCurrentProcess
TerminateProcess
EncodePointer
RaiseException
GetLastError
SetLastError
RtlUnwind
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
ExitProcess
GetModuleHandleExW
MultiByteToWideChar
WideCharToMultiByte
WriteFile
GetACP
HeapFree
DecodePointer
GetFileType
LCMapStringW
FindClose
FindFirstFileExA
FindNextFileA
IsValidCodePage
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetProcessHeap
CloseHandle
SetStdHandle
GetStringTypeW
HeapSize
GetConsoleCP
GetConsoleMode
SetFilePointerEx
CreateFileW
user32
GetMonitorInfoW
advapi32
GetPrivateObjectSecurity
RegQueryValueA
RegisterServiceCtrlHandlerW
ClearEventLogA
ObjectPrivilegeAuditAlarmA
AddAccessDeniedAce
GetFileSecurityW
RegOpenKeyExW
RegCreateKeyW
SetSecurityDescriptorControl
RegEnumValueW
RegQueryValueExW
GetAce
Sections
.text Size: 73KB - Virtual size: 72KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 40KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 72KB - Virtual size: 198KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 512B - Virtual size: 284B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 44KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ