C:\GQUYEBRAORNGJXGDPCRPRLSWVINAJC.pdb
Static task
static1
Behavioral task
behavioral1
Sample
eff4fb6a5f3e1258b3869c792ca8f2c8_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
eff4fb6a5f3e1258b3869c792ca8f2c8_JaffaCakes118
-
Size
105KB
-
MD5
eff4fb6a5f3e1258b3869c792ca8f2c8
-
SHA1
d9c0409f60e6383c8ff3d3e332dbce48f569f2ab
-
SHA256
aeca18906ae00656296f42932fa53d22b218b00ac269fdee1d346b2b55c1d6ef
-
SHA512
ab06aad7fdd22eaa01650d0495850952cf19171aa9a2512e64ee693273e3dfd33fba4a44b302728c0d09575f595b27a92f149b297ccf1c9193ded0226c773920
-
SSDEEP
3072:JuQScvlT1IyYLUr1Dy7hR1xeOeqTx2WRCZiX5HE:CcvlO7Se1x/t2WRYipHE
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource eff4fb6a5f3e1258b3869c792ca8f2c8_JaffaCakes118
Files
-
eff4fb6a5f3e1258b3869c792ca8f2c8_JaffaCakes118.exe windows:4 windows x86 arch:x86
5727939224215883b1439f6895578531
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetProcAddress
LoadLibraryA
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetStartupInfoA
InterlockedCompareExchange
Sleep
InterlockedExchange
GetSystemTimeAsFileTime
msvcr80
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
_encode_pointer
__set_app_type
_configthreadlocale
_unlock
__dllonexit
_lock
_onexit
_decode_pointer
_except_handler4_common
_invoke_watson
_controlfp_s
_initterm_e
_initterm
_acmdln
exit
_ismbblead
_XcptFilter
_exit
_cexit
__getmainargs
_amsg_exit
atoi
malloc
free
_crt_debugger_hook
memset
Sections
.text Size: 27KB - Virtual size: 26KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 428B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ