C:\nifa mamubanug93_coneya.pdb
Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Static task
static1
Behavioral task
behavioral1
Sample
b7f005f78f4fa1f50156e6ce98373aef46ea5b594322ad146d14e892ef04ce41.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
b7f005f78f4fa1f50156e6ce98373aef46ea5b594322ad146d14e892ef04ce41.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_4e55d2f399fd3b13f80f77ef214a2b2c328e57968ebad37c21be67f8ef0957a6
-
Size
659KB
-
MD5
a95c7cbd082dd5a976f9b64667a14f59
-
SHA1
7c0b7323097b88333fe0eb0a24db0a0dfda2849c
-
SHA256
4e55d2f399fd3b13f80f77ef214a2b2c328e57968ebad37c21be67f8ef0957a6
-
SHA512
ff342b48e140c37c5e237af6099201e4284a81d111991269a7707e1c918ea0a0a50c10e2a60b7f855ef20bf933e54ca179b600c87b6a1fc4cdf761409e204b74
-
SSDEEP
12288:Cg4UJqPvNbpxwK4nXzHv0LH1Vdjl4/us7arDhOQUc4MngPKWD4bIlv0Q:5JqHtQrDMLH1Vd+/r7aoQb4tKU/1
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/b7f005f78f4fa1f50156e6ce98373aef46ea5b594322ad146d14e892ef04ce41
Files
-
JaffaCakes118_4e55d2f399fd3b13f80f77ef214a2b2c328e57968ebad37c21be67f8ef0957a6.zip
-
b7f005f78f4fa1f50156e6ce98373aef46ea5b594322ad146d14e892ef04ce41.exe windows:5 windows x86 arch:x86
3be35b9541df7e97a48f1c30356bc7d3
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
VerSetConditionMask
SetLocaleInfoW
FindNextVolumeA
HeapWalk
GetNamedPipeHandleStateW
SystemTimeToFileTime
FillConsoleOutputCharacterW
CreateMailslotW
TerminateProcess
GetLastError
GetVersionExA
FreeResource
EnumResourceNamesA
FindNextFileA
CopyFileExW
BuildCommDCBW
SetDefaultCommConfigA
WriteProfileStringW
WritePrivateProfileStructW
LocalCompact
ChangeTimerQueueTimer
ReadConsoleInputA
WriteConsoleInputA
LoadResource
AddAtomA
SearchPathA
GetThreadTimes
CallNamedPipeW
GetDriveTypeA
BuildCommDCBAndTimeoutsW
VirtualProtect
GetModuleHandleA
GlobalAlloc
SetProcessPriorityBoost
GetProfileSectionW
DeleteFileW
FindFirstChangeNotificationA
VerifyVersionInfoA
FormatMessageA
SetDllDirectoryW
LoadLibraryA
WritePrivateProfileStringA
GetUserDefaultLCID
SetWaitableTimer
SetConsoleTextAttribute
InterlockedDecrement
GetStartupInfoW
GetSystemWow64DirectoryA
CopyFileW
SetCalendarInfoA
ContinueDebugEvent
EndUpdateResourceW
SetLastError
FreeLibraryAndExitThread
GetModuleFileNameW
FatalAppExitW
SetSystemTime
OpenFileMappingA
lstrcmpW
WriteFileGather
FlushConsoleInputBuffer
GetSystemTimeAdjustment
VirtualAllocEx
InterlockedExchangeAdd
GlobalUnfix
GetSystemWindowsDirectoryW
CopyFileA
GetACP
GlobalFindAtomW
lstrcatW
SetMailslotInfo
CreateActCtxW
GetPrivateProfileIntW
_lwrite
OutputDebugStringA
CreateNamedPipeA
GetAtomNameW
SetConsoleActiveScreenBuffer
EnumResourceTypesW
lstrlenA
DebugActiveProcessStop
WriteConsoleW
lstrcpyA
ReadConsoleOutputW
GetThreadContext
ReleaseActCtx
GetStringTypeA
GetPrivateProfileStringA
GetFileAttributesExA
LocalFileTimeToFileTime
MoveFileA
GetVolumePathNameA
GetCommMask
SetFileShortNameW
VerLanguageNameW
LockFile
ProcessIdToSessionId
GetQueuedCompletionStatus
AllocConsole
GlobalGetAtomNameW
SetComputerNameA
GetConsoleAliasExesLengthA
WriteConsoleInputW
SystemTimeToTzSpecificLocalTime
MoveFileWithProgressA
GetStringTypeExW
EnumSystemLocalesA
GetPrivateProfileIntA
GetModuleHandleW
OpenWaitableTimerA
GetConsoleAliasesLengthW
GlobalUnWire
FillConsoleOutputCharacterA
GetCompressedFileSizeA
FindNextVolumeMountPointA
SetThreadPriority
ReadConsoleW
MapUserPhysicalPagesScatter
WriteConsoleOutputCharacterW
QueryInformationJobObject
GetDateFormatW
GetConsoleAliasExesA
EnumDateFormatsA
SetDefaultCommConfigW
OpenMutexA
RaiseException
GetCommandLineA
GetStartupInfoA
HeapValidate
IsBadReadPtr
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
SetUnhandledExceptionFilter
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
Sleep
InterlockedIncrement
GetProcAddress
ExitProcess
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
HeapDestroy
HeapCreate
HeapFree
VirtualFree
WriteFile
HeapAlloc
GetCurrentProcess
UnhandledExceptionFilter
IsDebuggerPresent
HeapSize
HeapReAlloc
VirtualAlloc
GetOEMCP
GetCPInfo
IsValidCodePage
RtlUnwind
InitializeCriticalSectionAndSpinCount
DebugBreak
OutputDebugStringW
LoadLibraryW
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeW
GetLocaleInfoA
SetFilePointer
GetConsoleCP
GetConsoleMode
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
CreateFileA
CloseHandle
FlushFileBuffers
advapi32
InitiateSystemShutdownW
Sections
.text Size: 148KB - Virtual size: 147KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 588KB - Virtual size: 742KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ