C:\jotediguwobi zafuk55_dezuki\xobahifijagi\yeyomeziguc\36_kud.pdb
Static task
static1
Behavioral task
behavioral1
Sample
55e76df782e2a76e93ae1cc632942a169794a544b9c472e1043ea5a5eb70bd68.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
55e76df782e2a76e93ae1cc632942a169794a544b9c472e1043ea5a5eb70bd68.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_851fc4f6765ad4015d96a5952098b255c720ec8d88a974d6dfc498bec91910f3
-
Size
676KB
-
MD5
20c1063f984f5476f05de4c3735ef1a0
-
SHA1
65423aa958acb6b26d644221c90581a24269e878
-
SHA256
851fc4f6765ad4015d96a5952098b255c720ec8d88a974d6dfc498bec91910f3
-
SHA512
ae1f66d17c5f2476dec8be7c27dd8a668ad73a5c7bd964b68a733fd64dcfa6cf087539f7591e846836daecec4d7f1a7ba4801e58c5d05bbb17238273b794356a
-
SSDEEP
12288:3xy/guavLD20/BxB9wf1Ej5VtlTylwGMR0Hb6nCCkKeLcPpu7EQ0N/Yj:3sYuavL//B1wf1EjPtsJ2076CCkfcPkF
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/55e76df782e2a76e93ae1cc632942a169794a544b9c472e1043ea5a5eb70bd68
Files
-
JaffaCakes118_851fc4f6765ad4015d96a5952098b255c720ec8d88a974d6dfc498bec91910f3.zip
-
55e76df782e2a76e93ae1cc632942a169794a544b9c472e1043ea5a5eb70bd68.exe windows:5 windows x86 arch:x86
ed7df88ddba97c51d3b160fb2406ce26
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
VerifyVersionInfoW
WriteConsoleInputA
EnumDateFormatsW
CopyFileExW
DnsHostnameToComputerNameW
FindNextFileW
ReadConsoleOutputCharacterW
SetConsoleActiveScreenBuffer
LockFile
GetProfileSectionW
QueryDosDeviceW
RequestWakeupLatency
GetProcessPriorityBoost
GetDriveTypeW
GlobalGetAtomNameA
DeleteFileW
FindNextVolumeMountPointW
TlsSetValue
SizeofResource
WriteConsoleInputW
GetConsoleTitleW
GetComputerNameExW
OpenEventA
CallNamedPipeA
GetModuleHandleA
GetSystemDirectoryA
GetDriveTypeA
BuildCommDCBAndTimeoutsA
GetProcAddress
GetShortPathNameA
DeleteFileA
GetCommandLineW
InterlockedIncrement
InterlockedExchange
CopyFileW
CreateActCtxW
FormatMessageA
GetModuleHandleW
EnterCriticalSection
FindNextVolumeA
CreateIoCompletionPort
LoadLibraryA
CreateNamedPipeW
GetSystemDefaultLangID
GetConsoleAliasesLengthA
WriteProfileSectionW
AddAtomW
InterlockedDecrement
HeapFree
_hwrite
InterlockedCompareExchange
GetStartupInfoW
CreateMailslotW
GetCPInfoExW
GetSystemWow64DirectoryW
GetLastError
GetPrivateProfileIntW
GetConsoleAliasExesLengthW
WaitForDebugEvent
SetLastError
LoadLibraryW
VerifyVersionInfoA
VirtualAlloc
GetACP
lstrcpyA
GetConsoleAliasA
GetDiskFreeSpaceExA
TerminateProcess
EnumResourceLanguagesA
SetConsoleTextAttribute
GlobalGetAtomNameW
CreateJobSet
MoveFileW
lstrcpynA
EnumSystemLocalesA
WritePrivateProfileSectionW
WritePrivateProfileStructA
GetPrivateProfileSectionNamesW
GetFileAttributesW
FileTimeToSystemTime
SetTapeParameters
lstrcmpW
SetEvent
MoveFileA
CreateMutexA
FindResourceW
GetCommState
CreateFiber
GetConsoleFontSize
LocalAlloc
SetFileShortNameA
lstrcpyW
HeapLock
GetFileAttributesA
SetCalendarInfoW
GetSystemWindowsDirectoryW
GetConsoleAliasesW
EnumDateFormatsExW
GetComputerNameW
GetPrivateProfileStructW
_hread
LocalFlags
OpenWaitableTimerA
EnumResourceNamesW
CreateFileMappingW
SetProcessShutdownParameters
lstrcpynW
GetFullPathNameW
WriteConsoleW
FreeUserPhysicalPages
WriteConsoleOutputCharacterW
OpenJobObjectW
CreateFileW
SetCurrentDirectoryA
GlobalWire
GetFileInformationByHandle
CommConfigDialogW
CreateFileA
GetDefaultCommConfigA
LocalFree
Sleep
InitializeCriticalSection
DeleteCriticalSection
LeaveCriticalSection
RaiseException
RtlUnwind
WideCharToMultiByte
GetCommandLineA
GetStartupInfoA
HeapValidate
IsBadReadPtr
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetModuleFileNameW
GetCurrentProcess
IsDebuggerPresent
TlsGetValue
TlsAlloc
GetCurrentThreadId
TlsFree
GetOEMCP
GetCPInfo
IsValidCodePage
SetFilePointer
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
ExitProcess
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
HeapDestroy
HeapCreate
VirtualFree
WriteFile
HeapAlloc
HeapSize
HeapReAlloc
FlushFileBuffers
GetConsoleCP
GetConsoleMode
DebugBreak
OutputDebugStringA
OutputDebugStringW
InitializeCriticalSectionAndSpinCount
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
CloseHandle
user32
CharToOemBuffW
CharUpperW
GetMessageTime
LoadMenuA
advapi32
AbortSystemShutdownW
Sections
.text Size: 198KB - Virtual size: 197KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 586KB - Virtual size: 622KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.lan Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ruwu Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.dayewig Size: 512B - Virtual size: 150B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 26KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ