C:\tevayehazor pedahekanu\vegu\sej-geyigixa\decikedugox\xukuc.pdb
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_7ae5d04701cf9ced2c0bf855cd6a8683abee81c8c3c97777e553925f286ce7c2.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_7ae5d04701cf9ced2c0bf855cd6a8683abee81c8c3c97777e553925f286ce7c2.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_7ae5d04701cf9ced2c0bf855cd6a8683abee81c8c3c97777e553925f286ce7c2
-
Size
277KB
-
MD5
b518c804afea1679b41ab51a3f97f2ce
-
SHA1
f4e54ba7679cb4b71c06cc9e10f9bb7a4d072ef8
-
SHA256
7ae5d04701cf9ced2c0bf855cd6a8683abee81c8c3c97777e553925f286ce7c2
-
SHA512
2e0b28f9047effa47c284f59771b7df28b93f3f03c217ca59521ae72e7f9885130b9ec8cb18b0b7cff6245d6e495fb44b217e223362d325289648e2b731dd0b9
-
SSDEEP
6144:cFmzjJBIa3QoolCYK355QiP4uotmYQwiTSXJeEW431Ed3:c0BBIXTAYKp5QluoUVuXhEF
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource JaffaCakes118_7ae5d04701cf9ced2c0bf855cd6a8683abee81c8c3c97777e553925f286ce7c2
Files
-
JaffaCakes118_7ae5d04701cf9ced2c0bf855cd6a8683abee81c8c3c97777e553925f286ce7c2.exe windows:5 windows x86 arch:x86
07a4ac5b398af66f3ccc577b503891e1
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
HeapLock
GetExitCodeProcess
DeactivateActCtx
GetVersionExW
GetConsoleCP
GetConsoleAliasesLengthA
GetDefaultCommConfigA
FindFirstFileExA
GetDriveTypeA
FreeEnvironmentStringsW
SetProcessPriorityBoost
SetVolumeMountPointW
SetCurrentDirectoryW
GetLongPathNameW
CopyFileW
TlsGetValue
GetConsoleCursorInfo
SetComputerNameExW
SystemTimeToTzSpecificLocalTime
FindAtomA
ReleaseSemaphore
CallNamedPipeW
CreateMailslotW
BuildCommDCBAndTimeoutsA
VirtualProtect
LoadLibraryA
LocalAlloc
TryEnterCriticalSection
GetCommandLineW
InterlockedDecrement
GetCalendarInfoW
DeleteFileA
CreateActCtxW
OutputDebugStringA
SetSystemTimeAdjustment
SetPriorityClass
WritePrivateProfileStringW
GlobalUnWire
GetProcessHeap
GetStartupInfoW
GetDiskFreeSpaceExW
GetCPInfoExA
GetWindowsDirectoryA
GetSystemWow64DirectoryW
WriteProfileSectionA
GetProfileStringA
GetLastError
DeleteVolumeMountPointA
DebugBreak
GetPrivateProfileSectionW
lstrcmpA
ReadFileScatter
GetSystemWindowsDirectoryA
TerminateProcess
GlobalFindAtomW
FindCloseChangeNotification
GetTapeParameters
SetMailslotInfo
InterlockedExchange
DefineDosDeviceW
FindVolumeMountPointClose
EndUpdateResourceA
WriteConsoleA
GetSystemTimeAdjustment
GetPrivateProfileSectionA
WritePrivateProfileSectionA
GetPrivateProfileStructW
GetFileAttributesExW
MoveFileA
GetVolumePathNameA
HeapUnlock
lstrcmpW
SetDefaultCommConfigA
FindActCtxSectionGuid
SetThreadContext
MoveFileExW
GlobalUnlock
UnregisterWaitEx
BuildCommDCBA
PeekConsoleInputW
GetBinaryTypeW
OpenEventW
TransmitCommChar
WaitNamedPipeA
GetPrivateProfileSectionNamesW
FindResourceExW
EnumTimeFormatsW
GetLocalTime
SetLocalTime
OpenSemaphoreA
GetProcAddress
SetFileShortNameA
lstrcpyW
VerLanguageNameW
SetThreadExecutionState
SetSystemTime
LockFile
VerSetConditionMask
SetConsoleCP
GetConsoleAliasW
FlushConsoleInputBuffer
AllocConsole
GetAtomNameW
WriteConsoleInputA
TransactNamedPipe
EnumDateFormatsW
GetCommState
FileTimeToLocalFileTime
_lopen
GetWriteWatch
SetConsoleMode
GetModuleHandleA
WriteConsoleOutputCharacterA
GetConsoleAliasExesLengthA
HeapReAlloc
GetCommMask
SetFilePointer
CancelWaitableTimer
GetProcessHandleCount
GetCurrentProcessId
SetNamedPipeHandleState
GetCompressedFileSizeA
FindNextVolumeMountPointW
GetFullPathNameA
WriteProfileStringA
DeleteAtom
GlobalAddAtomW
AssignProcessToJobObject
QueryDosDeviceW
InitializeCriticalSection
Process32FirstW
GetBinaryTypeA
CreateIoCompletionPort
RaiseException
GetCommandLineA
GetStartupInfoA
HeapValidate
IsBadReadPtr
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetModuleFileNameW
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetModuleHandleW
Sleep
InterlockedIncrement
ExitProcess
TlsAlloc
TlsSetValue
GetCurrentThreadId
TlsFree
SetLastError
SetHandleCount
GetStdHandle
GetFileType
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
WideCharToMultiByte
GetEnvironmentStringsW
HeapDestroy
HeapCreate
HeapFree
VirtualFree
WriteFile
HeapAlloc
HeapSize
VirtualAlloc
GetACP
GetOEMCP
GetCPInfo
IsValidCodePage
RtlUnwind
InitializeCriticalSectionAndSpinCount
WriteConsoleW
OutputDebugStringW
LoadLibraryW
GetConsoleMode
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
FlushFileBuffers
SetStdHandle
GetConsoleOutputCP
CloseHandle
CreateFileA
user32
OemToCharW
Sections
.text Size: 154KB - Virtual size: 154KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 66KB - Virtual size: 1.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.wan Size: 512B - Virtual size: 5B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.yagom Size: 512B - Virtual size: 34B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 36KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ