C:\ipasireq\Parowo\Pikecutuh.pdb
Static task
static1
Behavioral task
behavioral1
Sample
d0bf57c9b237323cc2ccca63645a7de2_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d0bf57c9b237323cc2ccca63645a7de2_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d0bf57c9b237323cc2ccca63645a7de2_JaffaCakes118
-
Size
385KB
-
MD5
d0bf57c9b237323cc2ccca63645a7de2
-
SHA1
08c140ec8397b8677f0ae7fcfa1b0e23b0131285
-
SHA256
fc98a42de7e71fd96547092d4f210ec3c16deef79a1f0b88a570b30866a85563
-
SHA512
bf42683d04d841dafa8606de3009e4b0399dafe2f1c75e4b22a9146dffc7622e83a6cb5ed966b22784d634d7d1aadf4504652eb19be4a95bbfb914fd59d23ff7
-
SSDEEP
12288:nZMJkQzCkujXSJClRp8u2CivMS9YN/r/qiI8bT7:zQzf6XSiE3eNWiXv7
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d0bf57c9b237323cc2ccca63645a7de2_JaffaCakes118
Files
-
d0bf57c9b237323cc2ccca63645a7de2_JaffaCakes118.exe windows:5 windows x86 arch:x86
db88f19304ccea83879689960f7af5ae
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
winspool.drv
AbortPrinter
AddFormA
AddJobA
AddMonitorA
AddPortA
AddPrintProcessorA
AddPrintProvidorA
AddPrinterConnectionA
ClosePrinter
ConfigurePortA
DeleteFormA
DeleteMonitorA
DeletePortA
DeletePrintProcessorA
DeletePrintProvidorA
DeletePrinterKeyA
EndDocPrinter
EndPagePrinter
EnumFormsA
EnumPrintersA
FindClosePrinterChangeNotification
FlushPrinter
GetFormA
GetJobA
GetPrinterDataA
GetPrinterDriverDirectoryA
GetPrinterDriverA
GetPrinterA
OpenPrinterA
PrinterMessageBoxA
ReadPrinter
ResetPrinterA
ScheduleJob
SetPrinterDataExA
SetPrinterDataA
StartDocPrinterA
StartPagePrinter
WaitForPrinterChange
WritePrinter
XcvDataW
comctl32
ImageList_EndDrag
ImageList_GetBkColor
ImageList_GetImageCount
ImageList_Read
ImageList_GetImageInfo
ImageList_DragEnter
ImageList_Create
kernel32
RtlUnwind
GetLocaleInfoW
LoadLibraryW
InterlockedExchange
FreeLibrary
SetConsoleCtrlHandler
HeapReAlloc
GetStringTypeW
MultiByteToWideChar
LCMapStringW
EnterCriticalSection
FatalAppExitA
LeaveCriticalSection
IsProcessorFeaturePresent
GetCurrentProcessId
QueryPerformanceCounter
HeapSize
HeapCreate
DeleteCriticalSection
GetFileType
InitializeCriticalSectionAndSpinCount
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetModuleFileNameA
GetModuleFileNameW
GetStdHandle
WriteFile
ExitProcess
HeapAlloc
HeapFree
GetProcAddress
GetCurrentThread
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
CompareStringW
SetEnvironmentVariableA
HeapDestroy
GetSystemTimeAsFileTime
WriteConsoleW
Sleep
CreateProcessA
CloseHandle
GetStartupInfoA
CopyFileA
DeleteFileA
GetTickCount
CreateEventA
GetVersion
GetVolumeInformationA
GetLocalTime
CreateFileA
TlsGetValue
TlsAlloc
GetSystemInfo
GetComputerNameA
GetLogicalDriveStringsA
GetTimeFormatA
GetDateFormatA
GetCommandLineA
HeapSetInformation
GetStartupInfoW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EncodePointer
DecodePointer
TerminateProcess
GetCurrentProcess
WideCharToMultiByte
GetTimeZoneInformation
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
TlsSetValue
TlsFree
GetModuleHandleW
SetLastError
GetCurrentThreadId
GetLastError
Sections
.text Size: 152KB - Virtual size: 152KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 103KB - Virtual size: 103KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 127KB - Virtual size: 134KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 864B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ