C:\xex.pdb
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_baed73b9a7011be9797591a25769774a83bbefb8a71e5d26b794f4ff889dcd57.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
JaffaCakes118_baed73b9a7011be9797591a25769774a83bbefb8a71e5d26b794f4ff889dcd57.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_baed73b9a7011be9797591a25769774a83bbefb8a71e5d26b794f4ff889dcd57
-
Size
184KB
-
MD5
d121e64beade553769f6ef0cc7775e75
-
SHA1
c1426982e2214c2affc2064f24cccd08cda07c3c
-
SHA256
baed73b9a7011be9797591a25769774a83bbefb8a71e5d26b794f4ff889dcd57
-
SHA512
9932b163d97d30f4eb19f4498be9daac3ee8bf8bff7e9759058a383682caf65031f4cc8b3df5a381f788a456d3089b6da0566c0c422b144e110490f4a79871a7
-
SSDEEP
3072:JSmyTMOQe57yLWiwluxvHKiOLnaY3MPZPwLvYOYhgC:JUTMHeYz/KDnj8PLOk
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource JaffaCakes118_baed73b9a7011be9797591a25769774a83bbefb8a71e5d26b794f4ff889dcd57
Files
-
JaffaCakes118_baed73b9a7011be9797591a25769774a83bbefb8a71e5d26b794f4ff889dcd57.exe windows:5 windows x86 arch:x86
4f9c7d0d3671483fa7b1247d926d59c4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
HeapReAlloc
lstrlenA
EndUpdateResourceW
GetQueuedCompletionStatus
ReadConsoleA
GetCurrentProcess
SetEvent
BackupSeek
GetConsoleTitleA
WriteFile
GetEnvironmentStrings
InitAtomTable
HeapDestroy
GetFileAttributesA
FindNextVolumeW
IsProcessorFeaturePresent
GetTapePosition
WriteConsoleW
GetModuleFileNameW
ReleaseSemaphore
DeactivateActCtx
InterlockedExchange
GetProcAddress
BeginUpdateResourceW
GetProcessVersion
LocalAlloc
RemoveDirectoryW
SetConsoleWindowInfo
GetModuleHandleA
VirtualProtect
SetProcessShutdownParameters
GetCurrentProcessId
FindNextVolumeA
lstrcpyA
CreateFileW
HeapSize
GetCommandLineW
HeapSetInformation
GetStartupInfoW
DecodePointer
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EncodePointer
TerminateProcess
GetLastError
HeapFree
SetFilePointer
EnterCriticalSection
LeaveCriticalSection
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleW
SetLastError
GetCurrentThreadId
CloseHandle
ExitProcess
GetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
HeapCreate
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
Sleep
SetStdHandle
FlushFileBuffers
RtlUnwind
LCMapStringW
MultiByteToWideChar
GetStringTypeW
LoadLibraryW
HeapAlloc
RaiseException
Exports
Exports
@GetFirstVice@8
@SetViceVariants@12
Sections
.text Size: 99KB - Virtual size: 98KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 84KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.moxekog Size: 1024B - Virtual size: 624B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.joz Size: 512B - Virtual size: 23B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 58KB - Virtual size: 57KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ