C:\ruz-howihicok goginodizuwap58\cajotuy2.pdb
Static task
static1
Behavioral task
behavioral1
Sample
badca1fe5781d38c5ee80cb495550cf0_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
badca1fe5781d38c5ee80cb495550cf0_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
badca1fe5781d38c5ee80cb495550cf0_JaffaCakes118
-
Size
11.1MB
-
MD5
badca1fe5781d38c5ee80cb495550cf0
-
SHA1
a7d103fd9a1f2f95077d4b331e7a92ae843669e6
-
SHA256
9c4312d0147836994aa702299b458611d02ede212817b5a677dfef41cd59ccc3
-
SHA512
0694aa3d77d027c7196951a3fdd7361ddee98f421c30a0fd35819172566242e4d4008543e6ac5cfb34c6a7d9a1bf54e7576dd8674c6ef8a06a781830d9584b9a
-
SSDEEP
6144:x0YTUw7FfKLfRZm6WbrQd1svSnAKdKO3fhQCbG+2:hDhKLfRMbrA1WSAKddfHG
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource badca1fe5781d38c5ee80cb495550cf0_JaffaCakes118
Files
-
badca1fe5781d38c5ee80cb495550cf0_JaffaCakes118.exe windows:5 windows x86 arch:x86
35b9d7e45835878017a63458fe0511b5
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetCommandLineW
FileTimeToDosDateTime
GetNativeSystemInfo
TlsGetValue
GetStringTypeA
HeapAlloc
InterlockedIncrement
GetCommState
ReadConsoleA
GlobalSize
GetSystemWindowsDirectoryW
SetEnvironmentVariableW
GlobalLock
SetHandleInformation
CancelWaitableTimer
FreeEnvironmentStringsA
EnumResourceTypesA
ActivateActCtx
LoadLibraryW
TerminateThread
GetConsoleAliasExesLengthW
EnumResourceLanguagesA
GetCompressedFileSizeA
GetSystemDirectoryA
CompareStringW
lstrlenW
SetThreadPriority
WritePrivateProfileStringW
GetNamedPipeHandleStateW
GetPrivateProfileIntW
VerifyVersionInfoW
CreateDirectoryA
InterlockedExchange
SetCurrentDirectoryA
GetStartupInfoA
GetStdHandle
GetCPInfoExW
GetLastError
GetThreadLocale
GetProcAddress
GetProcessHeaps
EnterCriticalSection
CreateMemoryResourceNotification
DisableThreadLibraryCalls
GetPrivateProfileStringA
LoadLibraryA
LocalAlloc
SetSystemTime
GetOEMCP
Process32NextW
FindNextFileA
WriteProfileStringA
GetModuleHandleA
FindFirstChangeNotificationA
FreeEnvironmentStringsW
GetCurrentDirectoryA
GetCurrentThreadId
FindAtomW
UnregisterWaitEx
GetSystemTime
GetProfileSectionW
LCMapStringW
CopyFileExA
GetVolumeInformationW
CreateFileA
MultiByteToWideChar
GetStartupInfoW
HeapValidate
IsBadReadPtr
RaiseException
LeaveCriticalSection
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetModuleFileNameW
DeleteCriticalSection
InterlockedDecrement
GetACP
GetCPInfo
IsValidCodePage
GetModuleHandleW
TlsAlloc
TlsSetValue
TlsFree
SetLastError
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
Sleep
ExitProcess
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapDestroy
HeapCreate
HeapFree
VirtualFree
GetModuleFileNameA
WriteFile
HeapSize
HeapReAlloc
VirtualAlloc
RtlUnwind
WideCharToMultiByte
DebugBreak
OutputDebugStringA
WriteConsoleW
OutputDebugStringW
InitializeCriticalSectionAndSpinCount
LCMapStringA
GetStringTypeW
GetLocaleInfoA
FlushFileBuffers
GetConsoleCP
GetConsoleMode
SetFilePointer
CloseHandle
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
user32
GetMenuItemID
winhttp
WinHttpWriteData
Sections
.text Size: 117KB - Virtual size: 116KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 34KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 68KB - Virtual size: 19.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 10.9MB - Virtual size: 61KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ