C:\ziraku\zitibifaxata92\had.pdb
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_57a884e3676b83fc67b8841f323323328f48769b33f36b0dc0ff16ec6325ce96.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
JaffaCakes118_57a884e3676b83fc67b8841f323323328f48769b33f36b0dc0ff16ec6325ce96.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_57a884e3676b83fc67b8841f323323328f48769b33f36b0dc0ff16ec6325ce96
-
Size
345KB
-
MD5
09b34a896ceda160c3b6db196277f0ee
-
SHA1
f61d17e796c66914c1d8784cac5fe08fea46887c
-
SHA256
57a884e3676b83fc67b8841f323323328f48769b33f36b0dc0ff16ec6325ce96
-
SHA512
be397ce4024309e61a3e9e172cff19ffc27aba3d90542f80f821b8e9e4de4e4579e8ca39db63a4c5b71ad9e9caed95613259f6038ea10bc43c86e08f89b9cd72
-
SSDEEP
6144:iBIXCyGfOp1KieRTSbOyfQzk7tZgSOkvK9:iBxOuieRsOyfQzk4STy9
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource JaffaCakes118_57a884e3676b83fc67b8841f323323328f48769b33f36b0dc0ff16ec6325ce96
Files
-
JaffaCakes118_57a884e3676b83fc67b8841f323323328f48769b33f36b0dc0ff16ec6325ce96.exe windows:5 windows x86 arch:x86
ecea6c2e78924839dc7690eb1007c1e3
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
CallNamedPipeW
TerminateThread
GetExitCodeProcess
GetVersionExA
GetConsoleCP
GetConsoleAliasesLengthA
VerLanguageNameA
FindFirstFileExA
GetDriveTypeW
FreeEnvironmentStringsW
SetProcessPriorityBoost
SetVolumeMountPointW
GetLongPathNameW
CopyFileW
TlsSetValue
GetConsoleCursorInfo
LocalHandle
SystemTimeToTzSpecificLocalTime
FindAtomW
ReleaseMutex
GetNamedPipeHandleStateA
FileTimeToSystemTime
BuildCommDCBAndTimeoutsA
GetProcAddress
LoadLibraryA
GlobalAlloc
LocalReAlloc
DeleteFileW
GetCommandLineA
InterlockedExchange
GetCalendarInfoA
DeleteFileA
CreateActCtxA
SetPriorityClass
WritePrivateProfileStringW
GetProcessHeap
GlobalMemoryStatus
ReadConsoleOutputCharacterA
GetStartupInfoA
GetDiskFreeSpaceExW
GetCPInfoExA
GetWindowsDirectoryA
GetSystemWow64DirectoryW
GetCalendarInfoW
GetProfileStringA
SetLastError
GetStringTypeExW
DebugBreak
GetPrivateProfileSectionA
lstrcmpW
WriteFile
GetConsoleMode
TerminateProcess
GetThreadSelectorEntry
lstrcatW
CreateActCtxW
GetMailslotInfo
LocalFileTimeToFileTime
DefineDosDeviceW
EndUpdateResourceA
WriteConsoleA
GetPrivateProfileStructA
TryEnterCriticalSection
GetDriveTypeA
GetFileAttributesExW
HeapLock
PeekConsoleInputA
GetTapeParameters
CreateSemaphoreW
FindResourceExW
GetLocalTime
CreateSemaphoreA
CreateIoCompletionPort
SetThreadLocale
SetFileShortNameW
lstrcpyA
LockFile
GetConsoleAliasW
GetConsoleAliasExesLengthW
EnumDateFormatsA
GetDevicePowerState
GetWriteWatch
FreeEnvironmentStringsA
GetNumberOfConsoleInputEvents
TlsGetValue
GetComputerNameW
HeapFree
GlobalReAlloc
SignalObjectAndWait
CancelDeviceWakeupRequest
FindClose
SetWaitableTimer
OpenFileMappingW
GetProcessTimes
FatalAppExitW
lstrcpynA
GetNamedPipeInfo
FillConsoleOutputCharacterA
GetCompressedFileSizeA
FindNextVolumeMountPointA
GetFullPathNameW
WriteProfileStringA
GetLogicalDrives
GlobalAddAtomA
TerminateJobObject
QueryDosDeviceA
EnterCriticalSection
Process32NextW
SetCurrentDirectoryW
GetBinaryTypeA
OpenMutexW
InterlockedIncrement
InterlockedDecrement
WideCharToMultiByte
MultiByteToWideChar
InterlockedCompareExchange
Sleep
InitializeCriticalSection
DeleteCriticalSection
LeaveCriticalSection
RaiseException
RtlUnwind
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetModuleFileNameW
GetLastError
GetStartupInfoW
LCMapStringA
LCMapStringW
GetCPInfo
HeapValidate
IsBadReadPtr
GetStringTypeW
GetModuleHandleW
TlsAlloc
GetCurrentThreadId
TlsFree
GetStdHandle
OutputDebugStringA
WriteConsoleW
GetFileType
OutputDebugStringW
ExitProcess
LoadLibraryW
GetACP
GetOEMCP
IsValidCodePage
SetHandleCount
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetEnvironmentStringsW
GetCommandLineW
HeapDestroy
HeapCreate
VirtualFree
GetModuleFileNameA
GetLocaleInfoA
GetStringTypeA
HeapAlloc
HeapSize
HeapReAlloc
VirtualAlloc
IsValidLocale
EnumSystemLocalesA
GetUserDefaultLCID
FlushFileBuffers
SetFilePointer
InitializeCriticalSectionAndSpinCount
GetLocaleInfoW
SetStdHandle
GetConsoleOutputCP
CloseHandle
CreateFileA
Sections
.text Size: 270KB - Virtual size: 269KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 35KB - Virtual size: 102KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.lah Size: 512B - Virtual size: 5B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 22KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ