C:\lob\puzoripixavije55.pdb
Static task
static1
Behavioral task
behavioral1
Sample
cd40e2ae400d9246093680878435e4c0_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
cd40e2ae400d9246093680878435e4c0_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
cd40e2ae400d9246093680878435e4c0_JaffaCakes118
-
Size
11.3MB
-
MD5
cd40e2ae400d9246093680878435e4c0
-
SHA1
9d8db6d204bd8d15650b48dfd8b68a464ed67c61
-
SHA256
4bf9bf8d633e92cacd30456ef29f97945406ff53002d593fbb41ff6850e99c64
-
SHA512
985135f88b10aaa0d0f06877cfa509f631fcf084c91e9a66461334891734c85135db029187cbb821a8e8c1de75b81263016adbfc1632dfd6e126c92225d62c77
-
SSDEEP
196608:xrhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhh:Bhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhn
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource cd40e2ae400d9246093680878435e4c0_JaffaCakes118
Files
-
cd40e2ae400d9246093680878435e4c0_JaffaCakes118.exe windows:5 windows x86 arch:x86
e1dc734f9d3fd8ffe237c21274508ba5
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
HeapReAlloc
GlobalDeleteAtom
GetLocaleInfoA
InterlockedIncrement
GetQueuedCompletionStatus
GetEnvironmentStringsW
SetEvent
ReadConsoleW
GetCommandLineA
CreateActCtxW
GlobalAlloc
CopyFileW
FreeConsole
LeaveCriticalSection
GetFileAttributesA
HeapCreate
WriteConsoleW
lstrlenW
ReleaseSemaphore
SetConsoleTitleA
FlushFileBuffers
DeactivateActCtx
InterlockedExchange
GetProcAddress
BeginUpdateResourceW
RemoveDirectoryA
VerLanguageNameW
LocalAlloc
SetConsoleWindowInfo
SetEnvironmentVariableA
GetModuleFileNameA
SetConsoleTitleW
GetModuleHandleA
EraseTape
VirtualProtect
EndUpdateResourceA
FindFirstVolumeW
GetCurrentProcessId
GetPrivateProfileSectionW
FindNextVolumeA
lstrcpyW
GetConsoleOutputCP
WideCharToMultiByte
InterlockedDecrement
InterlockedCompareExchange
MultiByteToWideChar
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
GetLastError
HeapFree
HeapAlloc
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetStartupInfoW
GetCPInfo
RtlUnwind
RaiseException
LCMapStringW
LCMapStringA
GetStringTypeW
VirtualFree
VirtualAlloc
GetModuleHandleW
ExitProcess
WriteFile
GetStdHandle
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
SetHandleCount
GetFileType
GetStartupInfoA
SetFilePointer
GetACP
GetOEMCP
IsValidCodePage
GetModuleFileNameW
FreeEnvironmentStringsW
GetCommandLineW
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
GetStringTypeA
HeapSize
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
InitializeCriticalSectionAndSpinCount
LoadLibraryA
CloseHandle
CreateFileA
SetStdHandle
GetConsoleCP
GetConsoleMode
GetLocaleInfoW
SetEndOfFile
GetProcessHeap
ReadFile
WriteConsoleA
Exports
Exports
@SetFirstVice@8
Sections
.text Size: 134KB - Virtual size: 134KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 22KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 49KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 11.1MB - Virtual size: 137KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ