C:\pemaneraj20\cahelihayomupe\gihotoyuve\janagakasiza\gowic.pdb
Static task
static1
Behavioral task
behavioral1
Sample
11b599805f239b526083beb8e30a8738_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
11b599805f239b526083beb8e30a8738_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
11b599805f239b526083beb8e30a8738_JaffaCakes118
-
Size
461KB
-
MD5
11b599805f239b526083beb8e30a8738
-
SHA1
7568a0cb2aef5d2dae3ff3d9a808404ec6b28ddf
-
SHA256
d1c619e1afe873b97c09c8068b30efcaafffbfdfb0dce63cad7f1a8394e260a8
-
SHA512
6b3f058f52a4a94521090664b89ee56d060bed5e0347daca3dbd291f753797a65e1e6417835fc5a5629a5a38dd36d81003f85f6d2a36e89bb50e75d620a4b442
-
SSDEEP
12288:ckRfTOr6M4SCoOzKamsLcMtjgh5ioYOui:hfTubuowLcMtjU5Ui
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 11b599805f239b526083beb8e30a8738_JaffaCakes118
Files
-
11b599805f239b526083beb8e30a8738_JaffaCakes118.exe windows:5 windows x86 arch:x86
d1727cc76cb77410e59de4eb81f68a0b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
lstrlenA
GetConsoleAliasesLengthW
EnumDateFormatsExW
MoveFileExA
EndUpdateResourceW
InterlockedIncrement
InterlockedDecrement
ReadConsoleOutputAttribute
GetSystemWindowsDirectoryW
GetEnvironmentStringsW
GetUserDefaultLCID
WaitForSingleObject
SetConsoleScreenBufferSize
SetEvent
CreateActCtxW
GetConsoleCP
LocalShrink
ReadConsoleOutputW
GetVersionExW
GetFileAttributesA
lstrcpynW
GetConsoleAliasW
VerifyVersionInfoA
WriteConsoleW
WritePrivateProfileSectionW
IsBadWritePtr
ReadFile
GetModuleFileNameW
GetComputerNameA
GetSystemDirectoryA
CreateFileW
lstrcatA
GetACP
GetVolumePathNameA
VerifyVersionInfoW
InterlockedExchange
GetLastError
GetProcAddress
EnterCriticalSection
BuildCommDCBW
GetLocalTime
GetProcessId
LocalAlloc
SetCalendarInfoW
DnsHostnameToComputerNameA
CreateTapePartition
SetConsoleDisplayMode
SetFileApisToANSI
GlobalGetAtomNameW
SetEnvironmentVariableA
SetConsoleTitleW
GetModuleHandleA
UpdateResourceW
CancelTimerQueueTimer
GetConsoleTitleW
VirtualProtect
PeekConsoleInputA
FindFirstVolumeW
LCMapStringW
GetCompressedFileSizeA
GetSystemDefaultLangID
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
GetModuleHandleW
Sleep
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
HeapAlloc
FreeEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
DeleteCriticalSection
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
HeapCreate
VirtualFree
HeapFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
LeaveCriticalSection
TerminateProcess
GetCurrentProcess
IsDebuggerPresent
LoadLibraryA
InitializeCriticalSectionAndSpinCount
RaiseException
VirtualAlloc
HeapReAlloc
GetCPInfo
GetOEMCP
IsValidCodePage
RtlUnwind
HeapSize
GetLocaleInfoA
WideCharToMultiByte
GetStringTypeA
MultiByteToWideChar
GetStringTypeW
LCMapStringA
user32
RealGetWindowClassW
Sections
.text Size: 358KB - Virtual size: 358KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 40.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 71KB - Virtual size: 70KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ