C:\yagutavugi\39\cuhud_woxov.pdb
Static task
static1
Behavioral task
behavioral1
Sample
1D30.exe
Resource
win7-20241010-en
General
-
Target
JaffaCakes118_3410cc6e8f02ca9b276714082ebddd2d34e750645741ae228351aff7d43c55d4
-
Size
231KB
-
MD5
dd4b25af4110a573f5c2397ee44a7cee
-
SHA1
a104d3322e04a6412afaf6918ede73ff7257647d
-
SHA256
3410cc6e8f02ca9b276714082ebddd2d34e750645741ae228351aff7d43c55d4
-
SHA512
0fec2035346add404b7fdb771a6d313ba459a7b54195cab200773247334950a6ed1bcac3c5fcad21ed33290fe92161ad9c7da40c7fa3f85213342c942141b87e
-
SSDEEP
6144:tz/eBSK+h5TAw2tjs5VVsYGILa44zW7iVCIN3YJwTCAo:tzQl+fUHOTVMILa457GsJAC1
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/1D30.bin
Files
-
JaffaCakes118_3410cc6e8f02ca9b276714082ebddd2d34e750645741ae228351aff7d43c55d4.zip
Password: infected
-
1D30.bin.exe windows:5 windows x86 arch:x86
0cd33c6e999482610a616f4f885bbf79
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
MoveFileExW
OpenJobObjectA
GetCurrentProcess
EnumCalendarInfoExW
GetConsoleAliasesLengthA
GetUserDefaultLangID
GetEnvironmentStrings
GlobalAlloc
LoadLibraryW
SetConsoleMode
GetGeoInfoA
GetModuleFileNameW
GetSystemDirectoryA
GetBinaryTypeW
lstrcmpW
GetShortPathNameA
InterlockedIncrement
GetLastError
GetProcAddress
RemoveDirectoryA
GetDiskFreeSpaceW
GetAtomNameA
LoadLibraryA
LocalAlloc
CreateEventW
GetCommTimeouts
FindResourceA
FreeLibrary
LCMapStringA
SetDefaultCommConfigA
MultiByteToWideChar
EncodePointer
DecodePointer
GetCommandLineA
HeapSetInformation
GetStartupInfoW
GetModuleHandleW
ExitProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
GetCPInfo
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
IsProcessorFeaturePresent
EnterCriticalSection
LeaveCriticalSection
Sleep
HeapSize
WriteFile
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
SetFilePointer
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
HeapCreate
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
LCMapStringW
GetStringTypeW
HeapFree
RtlUnwind
HeapAlloc
HeapReAlloc
WriteConsoleW
SetStdHandle
FlushFileBuffers
RaiseException
CreateFileW
CloseHandle
gdi32
GetCharWidthFloatA
advapi32
ImpersonateAnonymousToken
Sections
.text Size: 250KB - Virtual size: 249KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 66KB - Virtual size: 39.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.sux Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.nesaj Size: 1024B - Virtual size: 624B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.var Size: 512B - Virtual size: 23B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 15KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 23KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ