C:\reh\memozixitisemetusudo89_ficut.pdb
Static task
static1
Behavioral task
behavioral1
Sample
ede325dea8cedf78d0da55321d32ee1d_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ede325dea8cedf78d0da55321d32ee1d_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ede325dea8cedf78d0da55321d32ee1d_JaffaCakes118
-
Size
231KB
-
MD5
ede325dea8cedf78d0da55321d32ee1d
-
SHA1
f70bbc73d4010f3c3a708baf41e57c16f332aab0
-
SHA256
3976664f712ab0e934cc170f6e85f3646f85336d004368803b3eeccc305f3a02
-
SHA512
1b20c65aedeefd75d294eb1376640872c8e0db958c22ce0524fc1e76ddb5218fda0f307ed558938a65d8a1c4a33ae10c8cb2139984ea298ab26460a849a8643b
-
SSDEEP
3072:C/4iwmXbKpqGDzpwqX6HBNEg3xehUcqwZifnbBR5kb8sebxUJgwfNVmjQDGnHFir:CgmbKdv6h3eJqwSVk+bxUJTVfGHBTG5
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ede325dea8cedf78d0da55321d32ee1d_JaffaCakes118
Files
-
ede325dea8cedf78d0da55321d32ee1d_JaffaCakes118.exe windows:5 windows x86 arch:x86
aeb9daee217e3be82249e7f5282f4c05
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
IsProcessInJob
GetModuleHandleA
GetCalendarInfoW
ReadConsoleInputW
DefineDosDeviceW
GlobalAlloc
DeleteFileW
HeapReAlloc
GetDefaultCommConfigA
LoadLibraryW
HeapAlloc
OpenSemaphoreA
GetProcAddress
GlobalFix
GetProfileStringW
OpenJobObjectA
CreateMailslotA
FreeEnvironmentStringsA
GetFileTime
CreateDirectoryExW
IsBadStringPtrW
WriteConsoleW
FlushFileBuffers
GetPrivateProfileSectionNamesW
lstrcmpA
lstrlenA
GetFirmwareEnvironmentVariableA
FatalExit
LockFile
SetProcessShutdownParameters
DeviceIoControl
EnumResourceTypesW
GetStdHandle
GetSystemDefaultLCID
GetFileAttributesExA
GetCurrentDirectoryW
GetModuleFileNameA
IsProcessorFeaturePresent
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
GetModuleHandleW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
GetCurrentProcess
TerminateProcess
GetLastError
SetLastError
RtlUnwind
RaiseException
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
ExitProcess
GetModuleHandleExW
MultiByteToWideChar
WideCharToMultiByte
WriteFile
GetACP
HeapFree
DecodePointer
GetFileType
LCMapStringW
FindClose
FindFirstFileExA
FindNextFileA
IsValidCodePage
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetProcessHeap
CloseHandle
SetStdHandle
GetStringTypeW
HeapSize
GetConsoleCP
GetConsoleMode
SetFilePointerEx
CreateFileW
user32
IsWinEventHookInstalled
advapi32
GetPrivateObjectSecurity
RegisterServiceCtrlHandlerW
ClearEventLogA
DeleteAce
ObjectPrivilegeAuditAlarmA
AddAccessDeniedAce
GetFileSecurityW
RegOpenKeyExW
RegCreateKeyW
SetSecurityDescriptorControl
RegEnumValueW
RegQueryValueExW
RegQueryValueW
Sections
.text Size: 66KB - Virtual size: 66KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 38KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 76KB - Virtual size: 201KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 512B - Virtual size: 176B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 44KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ