C:\zafumov\goregumi kimumusa hufaliwage\lovowum\sezaxoni\p.pdb
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_3c520498147ae370021f45ec0b819740a38d19437efd990cfb529a9a02210a55.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_3c520498147ae370021f45ec0b819740a38d19437efd990cfb529a9a02210a55.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_3c520498147ae370021f45ec0b819740a38d19437efd990cfb529a9a02210a55
-
Size
281KB
-
MD5
2840d22a020bc638ed748b3c1358e0fe
-
SHA1
cc3aa1f4f2bedb979c5d1f94b3cbcce3eead5bc8
-
SHA256
3c520498147ae370021f45ec0b819740a38d19437efd990cfb529a9a02210a55
-
SHA512
c5987b6b3454ac5a17fca6df1246b9678d9c387aabd422827d2d7cd95bc6a3ae33b9743f7ef9f8a78ae07c1e07650e3911ce0aaf4a05a3a978e3e55ac90a7898
-
SSDEEP
6144:aozHI8/57wH+3eTnl7QQriROhxxpeTr/ekI:3HP/57wH+urlcQrXzxp6L
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource JaffaCakes118_3c520498147ae370021f45ec0b819740a38d19437efd990cfb529a9a02210a55
Files
-
JaffaCakes118_3c520498147ae370021f45ec0b819740a38d19437efd990cfb529a9a02210a55.exe windows:5 windows x86 arch:x86
f47739d0cfd89d51cbbbec502f2604c9
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GlobalDeleteAtom
GetLocaleInfoA
HeapAlloc
EndUpdateResourceW
InterlockedIncrement
GetQueuedCompletionStatus
ReadConsoleA
GetEnvironmentStringsW
SetEvent
GetCommandLineA
CreateActCtxW
GetEnvironmentStrings
GlobalAlloc
CopyFileW
FreeConsole
LeaveCriticalSection
HeapCreate
FindNextVolumeW
GetFileAttributesW
GetModuleFileNameW
lstrlenW
SetConsoleTitleA
FlushFileBuffers
DeactivateActCtx
InterlockedExchange
GetProcAddress
BeginUpdateResourceW
WriteConsoleA
RemoveDirectoryW
SetConsoleWindowInfo
GetTapeParameters
SetEnvironmentVariableA
SetConsoleTitleW
GetModuleHandleA
EraseTape
VirtualProtect
GetCurrentProcessId
GetPrivateProfileSectionW
FindNextVolumeA
lstrcpyW
CreateFileA
WideCharToMultiByte
InterlockedDecrement
InterlockedCompareExchange
MultiByteToWideChar
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
GetLastError
HeapFree
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapReAlloc
GetStartupInfoA
GetCPInfo
RtlUnwind
RaiseException
LCMapStringW
LCMapStringA
GetStringTypeW
VirtualFree
VirtualAlloc
GetModuleHandleW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
SetFilePointer
CloseHandle
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
GetStringTypeA
HeapSize
GetACP
GetOEMCP
IsValidCodePage
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
InitializeCriticalSectionAndSpinCount
SetStdHandle
GetConsoleCP
GetConsoleMode
LoadLibraryA
GetLocaleInfoW
GetConsoleOutputCP
WriteConsoleW
Exports
Exports
@GetFirstVice@8
Sections
.text Size: 131KB - Virtual size: 131KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 22KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 117KB - Virtual size: 116KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ