C:\piyavexoxoli\jususazujega\podumufeke\vapepicima64_ciyahida-je.pdb
Static task
static1
Behavioral task
behavioral1
Sample
355c70e0db090f30fd4a908b39629e0a_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
355c70e0db090f30fd4a908b39629e0a_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
355c70e0db090f30fd4a908b39629e0a_JaffaCakes118
-
Size
466KB
-
MD5
355c70e0db090f30fd4a908b39629e0a
-
SHA1
95841e9ce3b6142815e04c028af9a6f2e6c043dc
-
SHA256
503289f727c870188564636eebe70560eada65ab9a0676b58407fcd6c45a3928
-
SHA512
ed108e90646f55c61124db01dd564e159e5ac7bd74f04d0ec1cdb44de94fd4bc0c5eee75aa63805e4b8f6fc456b3438d7f9a539c5747543ec21e2d4fc6f588c9
-
SSDEEP
12288:BmIuGqCTT/b1u7blYfcsQJKH6bTWc+Y0OYMOQi:RuGr/huXAUS6bauKQi
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 355c70e0db090f30fd4a908b39629e0a_JaffaCakes118
Files
-
355c70e0db090f30fd4a908b39629e0a_JaffaCakes118.exe windows:5 windows x86 arch:x86
d1727cc76cb77410e59de4eb81f68a0b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
lstrlenA
GetConsoleAliasesLengthW
EnumDateFormatsExW
MoveFileExA
EndUpdateResourceW
InterlockedIncrement
InterlockedDecrement
ReadConsoleOutputAttribute
GetSystemWindowsDirectoryW
GetEnvironmentStringsW
GetUserDefaultLCID
WaitForSingleObject
SetConsoleScreenBufferSize
SetEvent
CreateActCtxW
GetConsoleCP
LocalShrink
ReadConsoleOutputW
GetVersionExW
GetFileAttributesA
lstrcpynW
GetConsoleAliasW
VerifyVersionInfoA
WriteConsoleW
WritePrivateProfileSectionW
IsBadWritePtr
ReadFile
GetModuleFileNameW
GetComputerNameA
GetSystemDirectoryA
CreateFileW
lstrcatA
GetACP
GetVolumePathNameA
VerifyVersionInfoW
InterlockedExchange
GetLastError
GetProcAddress
EnterCriticalSection
BuildCommDCBW
GetLocalTime
GetProcessId
LocalAlloc
SetCalendarInfoW
DnsHostnameToComputerNameA
CreateTapePartition
SetConsoleDisplayMode
SetFileApisToANSI
GlobalGetAtomNameW
SetEnvironmentVariableA
SetConsoleTitleW
GetModuleHandleA
UpdateResourceW
CancelTimerQueueTimer
GetConsoleTitleW
VirtualProtect
PeekConsoleInputA
FindFirstVolumeW
LCMapStringW
GetCompressedFileSizeA
GetSystemDefaultLangID
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
GetModuleHandleW
Sleep
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
HeapAlloc
FreeEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
DeleteCriticalSection
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
HeapCreate
VirtualFree
HeapFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
LeaveCriticalSection
TerminateProcess
GetCurrentProcess
IsDebuggerPresent
LoadLibraryA
InitializeCriticalSectionAndSpinCount
RaiseException
VirtualAlloc
HeapReAlloc
GetCPInfo
GetOEMCP
IsValidCodePage
RtlUnwind
HeapSize
GetLocaleInfoA
WideCharToMultiByte
GetStringTypeA
MultiByteToWideChar
GetStringTypeW
LCMapStringA
user32
RealGetWindowClassW
Sections
.text Size: 364KB - Virtual size: 363KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 40.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 71KB - Virtual size: 70KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ