C:\zar23\codolexajulusu\munagulil9\tulatozafuyec\juvo.pdb
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_9b847b83bb51c8cf825e4b2fc385dab4e0e2c518029a1cedd8575f5f581bc942.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_9b847b83bb51c8cf825e4b2fc385dab4e0e2c518029a1cedd8575f5f581bc942.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_9b847b83bb51c8cf825e4b2fc385dab4e0e2c518029a1cedd8575f5f581bc942
-
Size
291KB
-
MD5
d19143b5b307f466773d78beaffdfddd
-
SHA1
3a0c0f85cac9a9c190d1b634e4a8d1b9ce139c62
-
SHA256
9b847b83bb51c8cf825e4b2fc385dab4e0e2c518029a1cedd8575f5f581bc942
-
SHA512
1767680e382d3879beda7361f844e75401714f33ede60c40a23715b53174f325307b0d7ed6228af25c4fa7ee15080f2e75cac40d08bb9bc17a05ad5ab1ab9f41
-
SSDEEP
6144:bLAYn+dp6In11uvJXgWxvRma9zxWQYeTGDMwfzh:bMWRI10vJQ+vRma9zxWQEdfzh
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource JaffaCakes118_9b847b83bb51c8cf825e4b2fc385dab4e0e2c518029a1cedd8575f5f581bc942
Files
-
JaffaCakes118_9b847b83bb51c8cf825e4b2fc385dab4e0e2c518029a1cedd8575f5f581bc942.exe windows:5 windows x86 arch:x86
ba8fb4919796ba15ef3c17ab1a11e5fc
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
TlsGetValue
GetCPInfo
ReadConsoleA
InterlockedDecrement
GetSystemWindowsDirectoryW
HeapFree
SetHandleInformation
GetProfileSectionA
SetVolumeMountPointW
UnlockFile
BackupSeek
FreeEnvironmentStringsA
GetModuleHandleW
IsBadReadPtr
GetConsoleAliasesLengthA
GetPrivateProfileStringW
GetDriveTypeA
ActivateActCtx
GlobalAlloc
GetPrivateProfileIntA
GetSystemWow64DirectoryW
GetVersionExW
SetDllDirectoryA
SetConsoleMode
SetConsoleCursorPosition
VerifyVersionInfoA
IsDBCSLeadByte
GetSystemDirectoryA
CreateActCtxA
CompareStringW
GetStartupInfoW
WritePrivateProfileStringW
GetNamedPipeHandleStateW
FindFirstFileExA
GetLastError
SetLastError
GetProcAddress
WriteProfileSectionA
GlobalGetAtomNameA
BuildCommDCBW
OpenWaitableTimerW
SetFileApisToANSI
QueryDosDeviceW
SetSystemTime
SetEnvironmentVariableA
GetModuleFileNameA
SetConsoleCursorInfo
FindFirstChangeNotificationA
GetCurrentDirectoryA
CompareStringA
GetFileTime
SetProcessShutdownParameters
SetFileShortNameA
ReadConsoleInputW
GetWindowsDirectoryW
DeleteFileW
LocalFileTimeToFileTime
CloseHandle
SetStdHandle
FlushFileBuffers
LCMapStringW
MoveFileA
GetCommandLineW
HeapSetInformation
IsProcessorFeaturePresent
EncodePointer
DecodePointer
EnterCriticalSection
LeaveCriticalSection
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetModuleFileNameW
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
InterlockedIncrement
ExitProcess
FreeEnvironmentStringsW
GetEnvironmentStringsW
HeapValidate
TlsAlloc
TlsSetValue
TlsFree
HeapCreate
WriteFile
RaiseException
RtlUnwind
GetACP
GetOEMCP
IsValidCodePage
SetFilePointer
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
OutputDebugStringA
WriteConsoleW
OutputDebugStringW
LoadLibraryW
HeapAlloc
HeapReAlloc
HeapSize
HeapQueryInformation
GetStringTypeW
MultiByteToWideChar
CreateFileW
user32
GetCursorInfo
GetMessagePos
winhttp
WinHttpCloseHandle
Sections
.text Size: 242KB - Virtual size: 242KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 4.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.kucev Size: 1024B - Virtual size: 741B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ