C:\rabiravas29\viwo.pdb
Static task
static1
Behavioral task
behavioral1
Sample
6cb236cc209892626e21acf97db96baa_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
6cb236cc209892626e21acf97db96baa_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
6cb236cc209892626e21acf97db96baa_JaffaCakes118
-
Size
593KB
-
MD5
6cb236cc209892626e21acf97db96baa
-
SHA1
c2d9be3d84d8eba7fb12ac0e95c4a941799511e0
-
SHA256
28f5cef5a2b08b32e95aaf863e096c87dfbba6160d829db379936672fac62def
-
SHA512
6f5acd4bfdb29ffe944c949a9e586ffa4b09b4c9d69a6147bc247c2bd25820f3075722521115c0b91fcb8ef69f22eec08be5a1388b6b80ddd8030996efad34ed
-
SSDEEP
12288:sLlFq+kfq4zlRAW/6CHtIg9kChUuDhwlg55oLgiIoQD5:sJF8JJRJ6CakkMGlGodI5
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6cb236cc209892626e21acf97db96baa_JaffaCakes118
Files
-
6cb236cc209892626e21acf97db96baa_JaffaCakes118.exe windows:5 windows x86 arch:x86
f40b232cbe413f9d51f8dd5200af3be3
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
EnumResourceNamesW
HeapReAlloc
lstrlenA
WritePrivateProfileStructA
GetModuleHandleExA
SetLocalTime
GetDriveTypeW
SetEndOfFile
CallNamedPipeA
_lwrite
InterlockedDecrement
WritePrivateProfileSectionA
CreateDirectoryW
GlobalLock
GetProfileSectionA
WaitForSingleObject
SetVolumeMountPointW
OpenSemaphoreA
GetModuleHandleW
CreateNamedPipeW
ReadConsoleW
EnumTimeFormatsA
CreateActCtxW
CreateDirectoryExW
GetPriorityClass
GlobalAlloc
GetVolumeInformationA
LoadLibraryW
GetConsoleMode
Sleep
ReadConsoleInputA
CopyFileW
_hread
GetVersionExW
GetComputerNameExA
SetConsoleMode
Beep
SetConsoleCursorPosition
GetBinaryTypeA
TerminateProcess
GetAtomNameW
ReadFile
GetModuleFileNameW
CreateFileW
CompareStringW
GetACP
FillConsoleOutputCharacterA
VerifyVersionInfoW
GlobalUnfix
FindFirstFileA
GetCPInfoExW
OpenMutexW
GetHandleInformation
IsDBCSLeadByteEx
GetCurrentDirectoryW
GetThreadLocale
ReadConsoleOutputCharacterA
GetProcAddress
GetProcessHeaps
IsValidCodePage
CopyFileA
SetComputerNameA
BuildCommDCBW
ResetEvent
ProcessIdToSessionId
UnhandledExceptionFilter
OpenWaitableTimerW
GetFileType
IsSystemResumeAutomatic
AddAtomW
SetCurrentDirectoryW
GetCommMask
GetPrivateProfileStructA
SetSystemTime
SetEnvironmentVariableA
WTSGetActiveConsoleSessionId
CreateIoCompletionPort
FreeEnvironmentStringsW
CompareStringA
SetCalendarInfoA
_lopen
ReadConsoleInputW
LocalSize
InterlockedPushEntrySList
TlsFree
LCMapStringW
CopyFileExA
CloseHandle
SetStdHandle
GetConsoleCP
SetFilePointer
SetConsoleTitleA
GetTempFileNameW
InterlockedIncrement
EncodePointer
DecodePointer
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
HeapValidate
IsBadReadPtr
GetLastError
DeleteFileA
GetCommandLineW
HeapSetInformation
GetStartupInfoW
RtlUnwind
RaiseException
WideCharToMultiByte
MultiByteToWideChar
GetCPInfo
ExitProcess
GetCurrentProcess
SetUnhandledExceptionFilter
IsDebuggerPresent
WriteFile
GetStdHandle
InitializeCriticalSectionAndSpinCount
HeapAlloc
GetModuleFileNameA
HeapSize
HeapQueryInformation
HeapFree
HeapCreate
GetOEMCP
TlsAlloc
TlsGetValue
TlsSetValue
GetCurrentThreadId
SetLastError
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetEnvironmentStringsW
SetHandleCount
GetLocaleInfoW
IsProcessorFeaturePresent
OutputDebugStringA
WriteConsoleW
OutputDebugStringW
GetStringTypeW
GetLocaleInfoA
IsValidLocale
EnumSystemLocalesA
GetUserDefaultLCID
FlushFileBuffers
user32
GetCursorInfo
GetListBoxInfo
GetComboBoxInfo
GetMenuBarInfo
advapi32
AdjustTokenPrivileges
Sections
.text Size: 488KB - Virtual size: 487KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 57KB - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 22KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 25KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ