C:\gozeva\fawegi\rifojapu\gezitaxezuxa_deb mifuyiha27\vok_61.pdb
Static task
static1
Behavioral task
behavioral1
Sample
3d7504da78e09704ec8902f63d156c4d_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3d7504da78e09704ec8902f63d156c4d_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
3d7504da78e09704ec8902f63d156c4d_JaffaCakes118
-
Size
460KB
-
MD5
3d7504da78e09704ec8902f63d156c4d
-
SHA1
c35451ab680bf6ed381f39e33d25aa39e3aa1bf6
-
SHA256
da6edc1276fab7bfa04b08b6dfcea00e185aa8cefe53c2b1d11529067871ab44
-
SHA512
1235d8d70bf45fca529ec772fd58c65bd3964590a081eecfeeac2b56e879b4c5b70888bf7e01cc8c6250408d24fc8100e490429e173087dcecaeaf939dc4cc38
-
SSDEEP
12288:T1u2U2mVCv9V0uFLAmZTp9zX7zmnGmDV/emaHONHGi:c2eVYVPF9Zl9r2G8Vnaemi
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3d7504da78e09704ec8902f63d156c4d_JaffaCakes118
Files
-
3d7504da78e09704ec8902f63d156c4d_JaffaCakes118.exe windows:5 windows x86 arch:x86
d1727cc76cb77410e59de4eb81f68a0b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
lstrlenA
GetConsoleAliasesLengthW
EnumDateFormatsExW
MoveFileExA
EndUpdateResourceW
InterlockedIncrement
InterlockedDecrement
ReadConsoleOutputAttribute
GetSystemWindowsDirectoryW
GetEnvironmentStringsW
GetUserDefaultLCID
WaitForSingleObject
SetConsoleScreenBufferSize
SetEvent
CreateActCtxW
GetConsoleCP
LocalShrink
ReadConsoleOutputW
GetVersionExW
GetFileAttributesA
lstrcpynW
GetConsoleAliasW
VerifyVersionInfoA
WriteConsoleW
WritePrivateProfileSectionW
IsBadWritePtr
ReadFile
GetModuleFileNameW
GetComputerNameA
GetSystemDirectoryA
CreateFileW
lstrcatA
GetACP
GetVolumePathNameA
VerifyVersionInfoW
InterlockedExchange
GetLastError
GetProcAddress
EnterCriticalSection
BuildCommDCBW
GetLocalTime
GetProcessId
LocalAlloc
SetCalendarInfoW
DnsHostnameToComputerNameA
CreateTapePartition
SetConsoleDisplayMode
SetFileApisToANSI
GlobalGetAtomNameW
SetEnvironmentVariableA
SetConsoleTitleW
GetModuleHandleA
UpdateResourceW
CancelTimerQueueTimer
GetConsoleTitleW
VirtualProtect
PeekConsoleInputA
FindFirstVolumeW
LCMapStringW
GetCompressedFileSizeA
GetSystemDefaultLangID
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
GetModuleHandleW
Sleep
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
HeapAlloc
FreeEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
DeleteCriticalSection
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
HeapCreate
VirtualFree
HeapFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
LeaveCriticalSection
TerminateProcess
GetCurrentProcess
IsDebuggerPresent
LoadLibraryA
InitializeCriticalSectionAndSpinCount
RaiseException
VirtualAlloc
HeapReAlloc
GetCPInfo
GetOEMCP
IsValidCodePage
RtlUnwind
HeapSize
GetLocaleInfoA
WideCharToMultiByte
GetStringTypeA
MultiByteToWideChar
GetStringTypeW
LCMapStringA
user32
RealGetWindowClassW
Sections
.text Size: 358KB - Virtual size: 358KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 40.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 70KB - Virtual size: 69KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ