C:\meyatege-ga.pdb
Static task
static1
Behavioral task
behavioral1
Sample
fb337e8710c169d08e14cd2a49e016b8_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fb337e8710c169d08e14cd2a49e016b8_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
fb337e8710c169d08e14cd2a49e016b8_JaffaCakes118
-
Size
10.5MB
-
MD5
fb337e8710c169d08e14cd2a49e016b8
-
SHA1
948e1a44363e35a282d0cc14ad336529b8057af9
-
SHA256
3719b22484738b1865755c8a80459d44eb391314565f8b5b568e8b6727d7d97a
-
SHA512
c85ef668e4357668c100d6e3a69b2c088a24de2e04c05a98031c4fb638a265d01142b2981d3bc777eebea4f205e66b7fd3352dcbf0e73d3a6bfe7c37750a53b5
-
SSDEEP
196608:xV8888888888888888888888888888888888888888888888888888888888888Y:b888888888888888888888888888888j
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource fb337e8710c169d08e14cd2a49e016b8_JaffaCakes118
Files
-
fb337e8710c169d08e14cd2a49e016b8_JaffaCakes118.exe windows:5 windows x86 arch:x86
e1dc734f9d3fd8ffe237c21274508ba5
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
HeapReAlloc
GlobalDeleteAtom
GetLocaleInfoA
InterlockedIncrement
GetQueuedCompletionStatus
GetEnvironmentStringsW
SetEvent
ReadConsoleW
GetCommandLineA
CreateActCtxW
GlobalAlloc
CopyFileW
FreeConsole
LeaveCriticalSection
GetFileAttributesA
HeapCreate
WriteConsoleW
lstrlenW
ReleaseSemaphore
SetConsoleTitleA
FlushFileBuffers
DeactivateActCtx
InterlockedExchange
GetProcAddress
BeginUpdateResourceW
RemoveDirectoryA
VerLanguageNameW
LocalAlloc
SetConsoleWindowInfo
SetEnvironmentVariableA
GetModuleFileNameA
SetConsoleTitleW
GetModuleHandleA
EraseTape
VirtualProtect
EndUpdateResourceA
FindFirstVolumeW
GetCurrentProcessId
GetPrivateProfileSectionW
FindNextVolumeA
lstrcpyW
GetConsoleOutputCP
WideCharToMultiByte
InterlockedDecrement
InterlockedCompareExchange
MultiByteToWideChar
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
GetLastError
HeapFree
HeapAlloc
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetStartupInfoW
GetCPInfo
RtlUnwind
RaiseException
LCMapStringW
LCMapStringA
GetStringTypeW
VirtualFree
VirtualAlloc
GetModuleHandleW
ExitProcess
WriteFile
GetStdHandle
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
SetHandleCount
GetFileType
GetStartupInfoA
SetFilePointer
GetACP
GetOEMCP
IsValidCodePage
GetModuleFileNameW
FreeEnvironmentStringsW
GetCommandLineW
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
GetStringTypeA
HeapSize
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
InitializeCriticalSectionAndSpinCount
LoadLibraryA
CloseHandle
CreateFileA
SetStdHandle
GetConsoleCP
GetConsoleMode
GetLocaleInfoW
SetEndOfFile
GetProcessHeap
ReadFile
WriteConsoleA
Exports
Exports
@SetFirstVice@8
Sections
.text Size: 135KB - Virtual size: 134KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 22KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 49KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 10.3MB - Virtual size: 137KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ