C:\cukaz\butunofeg-kalasaviju.pdb
Static task
static1
Behavioral task
behavioral1
Sample
6244ed13512a21b23867d705d80bb4fa_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
6244ed13512a21b23867d705d80bb4fa_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
6244ed13512a21b23867d705d80bb4fa_JaffaCakes118
-
Size
383KB
-
MD5
6244ed13512a21b23867d705d80bb4fa
-
SHA1
5b3705ff2130ddd63a312a09ac6e3111e7e41f10
-
SHA256
cbcd57dd83369317946567dba9624dedbf2ce33acc796b2ba6f4c57b7d3cf49a
-
SHA512
bd6bd18562e7b0fafa2dd4eb43865215a9a57788200bd61c3b9bb01171c287db1d7080d77d6f994e11cf3bffeacd43ef069e41e7695aa25a1faf7c45ab33d72c
-
SSDEEP
6144:JuKPDM0nqwyEuBR+4KkhuJrIYG8wh5XB2QFe2z3gecF:TPg0nqwyLBRphuyAwPR2/43Bk
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 6244ed13512a21b23867d705d80bb4fa_JaffaCakes118
Files
-
6244ed13512a21b23867d705d80bb4fa_JaffaCakes118.exe windows:5 windows x86 arch:x86
c27a98a29b21693846ec47ce91a249f1
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetFileSize
GetNativeSystemInfo
SetFilePointer
lstrlenA
GetConsoleAliasesLengthW
CopyFileExW
SetLocalTime
GetConsoleAliasExesLengthA
InterlockedIncrement
VerSetConditionMask
GetCommState
InterlockedDecrement
ZombifyActCtx
CompareFileTime
GetSystemWindowsDirectoryW
SetEnvironmentVariableW
GlobalLock
SetConsoleScreenBufferSize
WriteConsoleInputA
SetComputerNameW
FreeEnvironmentStringsA
VirtualFree
SetProcessPriorityBoost
FindResourceExA
GetComputerNameExA
GetFileAttributesW
GetBinaryTypeA
ReadFile
UnregisterWait
InterlockedExchange
SetCurrentDirectoryA
GetStartupInfoA
GetCPInfoExW
OpenMutexW
GetCurrentDirectoryW
GetProcAddress
CreateNamedPipeA
WriteProfileSectionA
ReadFileEx
SetStdHandle
DisableThreadLibraryCalls
GetPrivateProfileStringA
LoadLibraryA
CreateSemaphoreW
GetConsoleScreenBufferInfo
LocalAlloc
FindAtomA
EnumResourceNamesA
WriteProfileStringW
CompareStringA
FatalAppExitA
GetVersionExA
TlsAlloc
FindAtomW
DeleteFileW
LCMapStringW
AreFileApisANSI
GetOverlappedResult
GetComputerNameA
GetLastError
MoveFileA
GetCommandLineA
HeapValidate
IsBadReadPtr
RaiseException
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetModuleFileNameW
SetHandleCount
GetStdHandle
GetFileType
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
GetModuleHandleW
Sleep
ExitProcess
GetModuleFileNameA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
TlsGetValue
TlsSetValue
TlsFree
SetLastError
HeapDestroy
HeapCreate
HeapFree
WriteFile
HeapAlloc
HeapSize
HeapReAlloc
VirtualAlloc
GetACP
GetOEMCP
GetCPInfo
IsValidCodePage
RtlUnwind
InitializeCriticalSectionAndSpinCount
DebugBreak
OutputDebugStringA
WriteConsoleW
OutputDebugStringW
LoadLibraryW
GetConsoleCP
GetConsoleMode
MultiByteToWideChar
LCMapStringA
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
FlushFileBuffers
WriteConsoleA
GetConsoleOutputCP
CloseHandle
CreateFileA
GetModuleHandleA
gdi32
GetBoundsRect
Sections
.text Size: 129KB - Virtual size: 128KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 37KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 112KB - Virtual size: 46.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 193B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 22KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 81KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ