C:\coricapi\86\tesozuvilake\rojicete\sugusafa.pdb
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_d5ba04399baeda12b636b25ff28bb2a3fed82e8fa25e9a2683240685405ebfb4.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_d5ba04399baeda12b636b25ff28bb2a3fed82e8fa25e9a2683240685405ebfb4.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_d5ba04399baeda12b636b25ff28bb2a3fed82e8fa25e9a2683240685405ebfb4
-
Size
238KB
-
MD5
a35144bc26a7d80d9f1ccc75717c4feb
-
SHA1
f88f2374ddddd4036a0c149ee3d4631912ac367a
-
SHA256
d5ba04399baeda12b636b25ff28bb2a3fed82e8fa25e9a2683240685405ebfb4
-
SHA512
b99b7d9b6dff84c61f300c18f30e9c1bf97f1cba022717c67b75f7961ed847f6413138ddc3590376f10e2a92f19b0f5793af1e47a89ef897940358ec01fac657
-
SSDEEP
3072:57QHNeYxb1NOLvV0hroldaFG98PS6XABIWhVggjcGkNIVqI7sxkgaBChMpZa9uDB:sNeWb3wv2pFG8vABNz7ITsq7igavwVf
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource JaffaCakes118_d5ba04399baeda12b636b25ff28bb2a3fed82e8fa25e9a2683240685405ebfb4
Files
-
JaffaCakes118_d5ba04399baeda12b636b25ff28bb2a3fed82e8fa25e9a2683240685405ebfb4.exe windows:5 windows x86 arch:x86
9510c947cc2282bdda1a9b4a47d8d006
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetCurrentActCtx
GetEnvironmentStringsW
GetSystemDefaultLCID
GetTickCount
GetSystemTimeAsFileTime
ReadConsoleW
WriteFileGather
SetHandleCount
GlobalAlloc
InitializeCriticalSectionAndSpinCount
Sleep
GetProcessHandleCount
GetSystemWindowsDirectoryA
SetConsoleCP
DeleteVolumeMountPointW
FindNextVolumeW
SetConsoleCursorPosition
LCMapStringA
GetCPInfoExW
SetLastError
GetProcAddress
VirtualAlloc
BeginUpdateResourceW
EnumDateFormatsExA
GetFirmwareEnvironmentVariableW
EnterCriticalSection
VirtualAllocEx
LoadLibraryA
WriteConsoleA
GetDefaultCommConfigA
SetConsoleCursorInfo
RequestDeviceWakeup
QueryPerformanceFrequency
DuplicateHandle
DeleteAtom
lstrcpyW
GetAtomNameW
SetCriticalSectionSpinCount
HeapAlloc
GetModuleHandleW
ExitProcess
DecodePointer
GetCommandLineW
HeapSetInformation
GetStartupInfoW
LeaveCriticalSection
GetStdHandle
GetFileType
DeleteCriticalSection
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EncodePointer
TerminateProcess
GetCurrentProcess
WriteFile
GetModuleFileNameW
HeapCreate
IsProcessorFeaturePresent
GetLastError
SetFilePointer
HeapFree
CloseHandle
LoadLibraryW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
GetCurrentThreadId
InterlockedDecrement
FreeEnvironmentStringsW
QueryPerformanceCounter
GetCurrentProcessId
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
RtlUnwind
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
RaiseException
SetStdHandle
FlushFileBuffers
HeapSize
HeapReAlloc
WriteConsoleW
MultiByteToWideChar
LCMapStringW
GetStringTypeW
CreateFileW
user32
GetClipCursor
advapi32
AdjustTokenPrivileges
Sections
.text Size: 106KB - Virtual size: 105KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 15KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 110KB - Virtual size: 110KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ