C:\regirezofimig-porigexutufivupayiki-hekixa\pezo hidibigadahup\xo.pdb
Static task
static1
Behavioral task
behavioral1
Sample
d68fc5ecdcb504ec5935b6016eaffeb0_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
d68fc5ecdcb504ec5935b6016eaffeb0_JaffaCakes118
-
Size
997KB
-
MD5
d68fc5ecdcb504ec5935b6016eaffeb0
-
SHA1
7cf8d03da1f62ae3fe97f5d364c07fb7c2b2a497
-
SHA256
535f3c5756c98fb11c73758e16366d8db8a04f75e962e7cef1084d7520470ef5
-
SHA512
d6bf9136d3a2de75cb70b405423b63fcac19f9ca1b8cf2d812843f32876c8d6b561cc11489a2d950ed3f201d514bb37b18b2fe147dfd09e8996c6c9ddc0da16b
-
SSDEEP
24576:J7pgRGbO+YPxmXvFkRrlRa0v2O40OZPS:JyoSPPutqrva0v2OlKP
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d68fc5ecdcb504ec5935b6016eaffeb0_JaffaCakes118
Files
-
d68fc5ecdcb504ec5935b6016eaffeb0_JaffaCakes118.exe windows:5 windows x86 arch:x86
5e394b4e8aeaee9997adc2e2c15fda2f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
Beep
GetAtomNameW
GlobalUnfix
FindFirstFileExA
GetLastError
GetProcAddress
TransactNamedPipe
WritePrivateProfileStringA
GetModuleHandleA
SetProcessShutdownParameters
LocalSize
LCMapStringW
SetFileShortNameW
GlobalAlloc
SetCommTimeouts
EnumCalendarInfoExW
GetTickCount
QueryDosDeviceA
GetCurrentProcess
InterlockedIncrement
LoadLibraryExW
FindResourceW
GetLocaleInfoA
PeekNamedPipe
lstrlenA
HeapUnlock
HeapReAlloc
GetCommandLineA
HeapSetInformation
GetStartupInfoW
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetModuleHandleW
ExitProcess
DecodePointer
WriteFile
GetStdHandle
GetModuleFileNameW
GetModuleFileNameA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
InterlockedDecrement
GetCurrentThread
HeapCreate
HeapDestroy
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
LeaveCriticalSection
FatalAppExitA
EnterCriticalSection
SetConsoleCtrlHandler
FreeLibrary
InterlockedExchange
LoadLibraryW
GetLocaleInfoW
HeapFree
Sleep
RtlUnwind
MultiByteToWideChar
GetStringTypeW
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
HeapSize
HeapAlloc
IsProcessorFeaturePresent
advapi32
RegSetValueExW
GetServiceDisplayNameA
SetSecurityDescriptorSacl
GetSecurityDescriptorSacl
AddAccessAllowedAce
RegDeleteValueW
LookupPrivilegeValueW
NotifyChangeEventLog
EqualSid
CopySid
RegRestoreKeyA
LookupPrivilegeNameW
GetCurrentHwProfileA
CloseEventLog
Sections
.text Size: 60KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 823KB - Virtual size: 822KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 68KB - Virtual size: 41.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 39KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ