C:\xos\3-suhohon-dedosugis16 wizikacat-cufuv-dihefi_mahu\re.pdb
Static task
static1
Behavioral task
behavioral1
Sample
e46a45be45abafe25e65fd8fac9bea199be7441d054f29b34e156909b509105d.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
e46a45be45abafe25e65fd8fac9bea199be7441d054f29b34e156909b509105d.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_c7f3e326771b6b34a137dbc1a40ba507a315145c3f9a98207aa924e963afcbf3
-
Size
659KB
-
MD5
db8b1ca68ef7d86303f9c2202b83dd82
-
SHA1
559bfd6e90de80ddf23502d390b1627817bf4afd
-
SHA256
c7f3e326771b6b34a137dbc1a40ba507a315145c3f9a98207aa924e963afcbf3
-
SHA512
98a30f59215c7f1534ed1beef5cbac975c135899ab14407b39fd10d23c5b068de3933d64a21c78df6c7218d3acb82b14a21abc88cf48b05bb196aba43534a864
-
SSDEEP
12288:K//tz+uJxpxtdQ/gA8vlfEZ54XrNUCh1Yoa+ikML802fC0MbrjJlSTxcA3oWiZXM:gVz+Wp1igNlhNpxalkMWfC0MXjJlSTxH
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/e46a45be45abafe25e65fd8fac9bea199be7441d054f29b34e156909b509105d
Files
-
JaffaCakes118_c7f3e326771b6b34a137dbc1a40ba507a315145c3f9a98207aa924e963afcbf3.zip
-
e46a45be45abafe25e65fd8fac9bea199be7441d054f29b34e156909b509105d.exe windows:5 windows x86 arch:x86
2dc8d3e007e3b7c314d036ccc5967cbc
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
VerSetConditionMask
SetLocaleInfoW
FindNextVolumeA
HeapWalk
GetNamedPipeHandleStateW
SystemTimeToFileTime
FillConsoleOutputCharacterW
VirtualFree
TerminateProcess
GetLastError
GetVersionExA
FreeResource
EnumResourceNamesA
FindNextFileA
CopyFileExW
BuildCommDCBW
SetDefaultCommConfigA
WriteProfileStringW
WritePrivateProfileStructW
LocalCompact
ChangeTimerQueueTimer
ReadConsoleInputA
WriteConsoleInputA
LoadResource
AddAtomA
SearchPathA
GetThreadTimes
CallNamedPipeW
GetDriveTypeA
BuildCommDCBAndTimeoutsW
VirtualProtect
LoadLibraryA
GlobalAlloc
SetProcessPriorityBoost
GetProfileSectionW
DeleteFileW
FindFirstChangeNotificationA
VerifyVersionInfoA
FormatMessageA
SetDllDirectoryW
GetModuleHandleA
WritePrivateProfileStringA
GetUserDefaultLCID
SetWaitableTimer
SetConsoleTextAttribute
InterlockedDecrement
GetStartupInfoW
GetSystemWow64DirectoryA
CopyFileW
SetCalendarInfoA
ContinueDebugEvent
EndUpdateResourceW
SetLastError
FreeLibraryAndExitThread
GetModuleFileNameW
FatalAppExitW
SetSystemTime
OpenFileMappingA
lstrcmpW
WriteFileGather
FlushConsoleInputBuffer
SetDefaultCommConfigW
GetSystemTimeAdjustment
InterlockedExchangeAdd
GlobalUnfix
GetSystemWindowsDirectoryW
CopyFileA
GetACP
GlobalFindAtomW
lstrcatW
SetMailslotInfo
CreateActCtxW
GetPrivateProfileIntW
_lwrite
OutputDebugStringA
CreateNamedPipeA
GetAtomNameW
SetConsoleActiveScreenBuffer
EnumResourceTypesW
lstrlenA
DebugActiveProcessStop
WriteConsoleW
lstrcpyA
ReadConsoleOutputW
GetThreadContext
ReleaseActCtx
GetStringTypeA
GetPrivateProfileStringA
GetFileAttributesExA
LocalFileTimeToFileTime
MoveFileA
GetVolumePathNameA
GetCommMask
SetFileShortNameW
VerLanguageNameW
LockFile
ProcessIdToSessionId
GetQueuedCompletionStatus
AllocConsole
GlobalGetAtomNameW
SetComputerNameA
GetConsoleAliasExesLengthA
WriteConsoleInputW
CreateMailslotW
SystemTimeToTzSpecificLocalTime
MoveFileWithProgressA
GetStringTypeExW
EnumSystemLocalesA
GetPrivateProfileIntA
GetModuleHandleW
OpenWaitableTimerA
GetConsoleAliasesLengthW
GlobalUnWire
FillConsoleOutputCharacterA
GetCompressedFileSizeA
FindNextVolumeMountPointA
SetThreadPriority
ReadConsoleW
MapUserPhysicalPagesScatter
WriteConsoleOutputCharacterW
QueryInformationJobObject
GetDateFormatW
GetConsoleAliasExesW
EnumDateFormatsA
VirtualAllocEx
OpenMutexA
RaiseException
GetCommandLineA
GetStartupInfoA
HeapValidate
IsBadReadPtr
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
SetUnhandledExceptionFilter
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
Sleep
InterlockedIncrement
GetProcAddress
ExitProcess
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
HeapDestroy
HeapCreate
HeapFree
WriteFile
HeapAlloc
GetCurrentProcess
UnhandledExceptionFilter
IsDebuggerPresent
HeapSize
HeapReAlloc
VirtualAlloc
GetOEMCP
GetCPInfo
IsValidCodePage
RtlUnwind
InitializeCriticalSectionAndSpinCount
DebugBreak
OutputDebugStringW
LoadLibraryW
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeW
GetLocaleInfoA
SetFilePointer
GetConsoleCP
GetConsoleMode
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
CreateFileA
CloseHandle
FlushFileBuffers
advapi32
InitiateSystemShutdownA
Sections
.text Size: 148KB - Virtual size: 147KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 589KB - Virtual size: 742KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ