C:\getalik45\fahunugelakuk vox38-yeja.pdb
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_e8775ba19c3e870f2d2b82ded8a857c1e398225c3cb2b3525d20e70441f9db48.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
JaffaCakes118_e8775ba19c3e870f2d2b82ded8a857c1e398225c3cb2b3525d20e70441f9db48.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_e8775ba19c3e870f2d2b82ded8a857c1e398225c3cb2b3525d20e70441f9db48
-
Size
238KB
-
MD5
46b1ff10b780d1ce8d7be7ef3b86acb0
-
SHA1
e4e1e2e1c964f498f1bb9227ed48a7202e7a45a1
-
SHA256
e8775ba19c3e870f2d2b82ded8a857c1e398225c3cb2b3525d20e70441f9db48
-
SHA512
c6b57a4091205920954add28de487ba5e103cfdf688067ecf6431a41ccd1398ec24277e478d4df939b1c2e6a984bba838747a8ab4cd978aaeb8de6a78fe0a256
-
SSDEEP
3072:R7iI0UsrZRD2ALLqOju9/DyF6IZKVggjcGkNIVqI7sxkgaBChMpZa9uD6Vdyhkq:YHUsrZRDnLXu9GMSy7ITsq7igavwVf
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource JaffaCakes118_e8775ba19c3e870f2d2b82ded8a857c1e398225c3cb2b3525d20e70441f9db48
Files
-
JaffaCakes118_e8775ba19c3e870f2d2b82ded8a857c1e398225c3cb2b3525d20e70441f9db48.exe windows:5 windows x86 arch:x86
d6f1a2cb84dbc438e72cd46aa17d4119
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetCurrentActCtx
GetEnvironmentStringsW
GetSystemDefaultLCID
GetTickCount
GetProcessHeap
GetSystemTimeAsFileTime
ReadConsoleW
WriteFileGather
SetHandleCount
GlobalAlloc
InitializeCriticalSectionAndSpinCount
Sleep
GetProcessHandleCount
GetSystemWindowsDirectoryA
SetConsoleCP
DeleteVolumeMountPointW
GetFileAttributesA
FindNextVolumeW
SetConsoleCursorPosition
GetAtomNameW
SetLastError
GetProcAddress
VirtualAlloc
EnumDateFormatsExA
GetFirmwareEnvironmentVariableW
EnterCriticalSection
VirtualAllocEx
LoadLibraryA
SetConsoleWindowInfo
GetDefaultCommConfigA
SetConsoleCursorInfo
RequestDeviceWakeup
GetConsoleTitleW
QueryPerformanceFrequency
DuplicateHandle
DeleteAtom
lstrcpyW
LCMapStringW
CreateFileW
WriteConsoleW
SetCriticalSectionSpinCount
HeapAlloc
GetModuleHandleW
ExitProcess
DecodePointer
GetCommandLineW
HeapSetInformation
GetStartupInfoW
WriteFile
GetStdHandle
GetModuleFileNameW
HeapCreate
EncodePointer
LeaveCriticalSection
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
GetCurrentProcess
IsProcessorFeaturePresent
GetFileType
DeleteCriticalSection
GetLastError
SetFilePointer
HeapFree
CloseHandle
LoadLibraryW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
GetCurrentThreadId
InterlockedDecrement
FreeEnvironmentStringsW
QueryPerformanceCounter
GetCurrentProcessId
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
WideCharToMultiByte
RtlUnwind
RaiseException
SetStdHandle
GetConsoleCP
GetConsoleMode
FlushFileBuffers
HeapSize
HeapReAlloc
MultiByteToWideChar
GetStringTypeW
user32
GetClipCursor
advapi32
AdjustTokenPrivileges
Sections
.text Size: 105KB - Virtual size: 105KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 15KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 110KB - Virtual size: 110KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ