C:\zajaxewugetile xotivifoy yoyoxotinaba.pdb
Static task
static1
Behavioral task
behavioral1
Sample
c4dea1d39e7c009a8dd333e5e84a0486_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c4dea1d39e7c009a8dd333e5e84a0486_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
c4dea1d39e7c009a8dd333e5e84a0486_JaffaCakes118
-
Size
3.9MB
-
MD5
c4dea1d39e7c009a8dd333e5e84a0486
-
SHA1
fbfaa875ffd294b407d038439f8cb561c033cbe1
-
SHA256
e251bbef2c33494c43462511bda36339cf2e8b1be5aa30bb77fdc5d168d28db4
-
SHA512
377f196ea88f26f90610fa91543f264c7a710e348695580254458b47ef6f7f930d4adacf85c86eb6aa9461c4edaaa83fe65e0ce8f2b7371e8d54b3c7c2de8da6
-
SSDEEP
98304:HKIr+ZQqjWg00mSvAbQ05eKz4U0BAyHkVTFl:qI6Sg2vQ9KzDFFl
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c4dea1d39e7c009a8dd333e5e84a0486_JaffaCakes118
Files
-
c4dea1d39e7c009a8dd333e5e84a0486_JaffaCakes118.exe windows:5 windows x86 arch:x86
da59b9213304505cb5012cf5463cd73b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
FillConsoleOutputCharacterA
ReadConsoleA
GetTickCount
GetConsoleAliasExesLengthW
IsProcessorFeaturePresent
ReadFile
GetSystemDirectoryA
GetTempPathW
GetLongPathNameW
GetProcAddress
IsValidCodePage
FindClose
ResetEvent
LoadLibraryA
LocalAlloc
CreateEventW
VirtualLock
GetModuleHandleA
DebugBreakProcess
CreateFileW
GetStringTypeW
FlushFileBuffers
WriteConsoleW
SetStdHandle
SetFilePointerEx
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLastError
HeapFree
HeapAlloc
EncodePointer
DecodePointer
ExitProcess
GetModuleHandleExW
AreFileApisANSI
MultiByteToWideChar
WideCharToMultiByte
GetCommandLineW
RaiseException
RtlUnwind
GetProcessHeap
GetStdHandle
WriteFile
GetModuleFileNameW
HeapSize
IsDebuggerPresent
EnterCriticalSection
LeaveCriticalSection
GetConsoleCP
GetConsoleMode
DeleteCriticalSection
FatalAppExitA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
SetLastError
InitializeCriticalSectionAndSpinCount
Sleep
GetCurrentProcess
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
GetModuleHandleW
CreateSemaphoreW
SetConsoleCtrlHandler
FreeLibrary
LoadLibraryExW
GetACP
GetOEMCP
GetCPInfo
GetCurrentThread
GetCurrentThreadId
GetFileType
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetEnvironmentStringsW
FreeEnvironmentStringsW
OutputDebugStringW
HeapReAlloc
GetDateFormatW
GetTimeFormatW
CompareStringW
LCMapStringW
GetLocaleInfoW
CloseHandle
user32
GetMessageExtraInfo
SetClassWord
CallWindowProcW
GetWindow
ShowWindow
DestroyWindow
msimg32
GradientFill
Exports
Exports
_ExportVars@4
Sections
.text Size: 3.9MB - Virtual size: 3.9MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 120KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.xepi Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 19KB - Virtual size: 2.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ