C:\zobafogu\23\kiy34\yugaro_yiresotafu52\ves64\pige58-mohexu.pdb
Static task
static1
Behavioral task
behavioral1
Sample
b19ea68941ac6a60f6a2d98fa80c022c_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b19ea68941ac6a60f6a2d98fa80c022c_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
b19ea68941ac6a60f6a2d98fa80c022c_JaffaCakes118
-
Size
181KB
-
MD5
b19ea68941ac6a60f6a2d98fa80c022c
-
SHA1
e1e3166abb974f8f1194005e46f73c2eb4218ead
-
SHA256
cfc34e5f72f2f5960b55cdf15d303a4a3b1922779743587d81c7de00af23f2c0
-
SHA512
a52cbf0539df5706b286f878d328dc02e1a2111c112b77be027e6d8a6d8fadea47373484c8e7c33b64ee9a2280dd225a4c91de620f63a904a064d89e6d08d644
-
SSDEEP
3072:vvLNYWCYxeQLugb9MUcG2Hjn1c8b6R18a4ROTR/CZAQ:vvLA4TuuWHjaWSORON/Ci
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource b19ea68941ac6a60f6a2d98fa80c022c_JaffaCakes118
Files
-
b19ea68941ac6a60f6a2d98fa80c022c_JaffaCakes118.exe windows:5 windows x86 arch:x86
d1727cc76cb77410e59de4eb81f68a0b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
lstrlenA
GetConsoleAliasesLengthW
EnumDateFormatsExW
MoveFileExA
EndUpdateResourceW
InterlockedIncrement
InterlockedDecrement
ReadConsoleOutputAttribute
GetSystemWindowsDirectoryW
GetEnvironmentStringsW
GetUserDefaultLCID
WaitForSingleObject
SetConsoleScreenBufferSize
SetEvent
CreateActCtxW
GetConsoleCP
LocalShrink
ReadConsoleOutputW
GetVersionExW
GetFileAttributesA
lstrcpynW
GetConsoleAliasW
VerifyVersionInfoA
WriteConsoleW
WritePrivateProfileSectionW
IsBadWritePtr
ReadFile
GetModuleFileNameW
GetComputerNameA
GetSystemDirectoryA
CreateFileW
lstrcatA
GetACP
GetVolumePathNameA
VerifyVersionInfoW
InterlockedExchange
GetLastError
GetProcAddress
EnterCriticalSection
BuildCommDCBW
GetLocalTime
GetProcessId
LocalAlloc
SetCalendarInfoW
DnsHostnameToComputerNameA
CreateTapePartition
SetConsoleDisplayMode
SetFileApisToANSI
GlobalGetAtomNameW
SetEnvironmentVariableA
SetConsoleTitleW
GetModuleHandleA
UpdateResourceW
CancelTimerQueueTimer
GetConsoleTitleW
VirtualProtect
PeekConsoleInputA
FindFirstVolumeW
LCMapStringW
GetCompressedFileSizeA
GetSystemDefaultLangID
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
GetModuleHandleW
Sleep
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
HeapAlloc
FreeEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
DeleteCriticalSection
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
HeapCreate
VirtualFree
HeapFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
LeaveCriticalSection
TerminateProcess
GetCurrentProcess
IsDebuggerPresent
LoadLibraryA
InitializeCriticalSectionAndSpinCount
RaiseException
VirtualAlloc
HeapReAlloc
GetCPInfo
GetOEMCP
IsValidCodePage
RtlUnwind
HeapSize
GetLocaleInfoA
WideCharToMultiByte
GetStringTypeA
MultiByteToWideChar
GetStringTypeW
LCMapStringA
user32
RealGetWindowClassW
Sections
.text Size: 78KB - Virtual size: 78KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 40.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 71KB - Virtual size: 70KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ