C:\nulejafuzolof\teciduwoh.pdb
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_da14cd2e1f896bcd043fce50c512500fa036a68be25bf744dbed94c78e971b87.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_da14cd2e1f896bcd043fce50c512500fa036a68be25bf744dbed94c78e971b87.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_da14cd2e1f896bcd043fce50c512500fa036a68be25bf744dbed94c78e971b87
-
Size
254KB
-
MD5
e69ff98ea2f9d45fc961b31e8225dfff
-
SHA1
0e30d3b1d5a120bef7d9ac10ec847c31dde82765
-
SHA256
da14cd2e1f896bcd043fce50c512500fa036a68be25bf744dbed94c78e971b87
-
SHA512
62d10ec5ba321c2f04587a1a4255e1c2395557ce46a39866823b807f4a7062c6bb7309c77bb82e08b89526e3fdce157b9d1df25c540d0e2ef3276e09be43bf58
-
SSDEEP
3072:v0Dpf7yqdUqSSWixrhMMp5JvpmzI5RjRMF7wgBdOXCMueDbhacvPhEwrV56I/:YS3iIMpbpmz0jiFTdOXJu01dvZRN/
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource JaffaCakes118_da14cd2e1f896bcd043fce50c512500fa036a68be25bf744dbed94c78e971b87
Files
-
JaffaCakes118_da14cd2e1f896bcd043fce50c512500fa036a68be25bf744dbed94c78e971b87.exe windows:5 windows x86 arch:x86
5ec00bbaa469943db4b6795b01cc4091
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
lstrlenA
InterlockedIncrement
GetSystemWindowsDirectoryW
GetNamedPipeHandleStateA
SetHandleInformation
CancelWaitableTimer
GetComputerNameW
GetModuleHandleW
GetProcessHeap
GetConsoleAliasesLengthA
ConvertFiberToThread
ReadConsoleW
GetCompressedFileSizeW
GetSystemWow64DirectoryA
TlsSetValue
LoadLibraryW
GetConsoleMode
SetVolumeMountPointA
GetVersionExW
HeapCreate
SetDllDirectoryA
GetVolumePathNamesForVolumeNameW
VerifyVersionInfoA
IsDBCSLeadByte
GetModuleFileNameW
CreateActCtxA
GetEnvironmentVariableA
CompareStringW
WriteConsoleInputW
WritePrivateProfileStringW
VerifyVersionInfoW
SetCurrentDirectoryA
GetLastError
GetLongPathNameW
SetLastError
BackupRead
CreateNamedPipeA
FindClose
GetPrivateProfileStringA
ProcessIdToSessionId
LocalAlloc
GetProcessShutdownParameters
FreeEnvironmentStringsW
WriteProfileStringW
BuildCommDCBA
VirtualProtect
GetConsoleCursorInfo
GetSystemRegistryQuota
OutputDebugStringA
ReadConsoleInputW
FileTimeToLocalFileTime
CreateWaitableTimerA
GetSystemTime
TlsFree
CopyFileExA
CommConfigDialogW
GetACP
SearchPathW
GetCommandLineW
HeapSetInformation
GetStartupInfoW
SetUnhandledExceptionFilter
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
InterlockedDecrement
DecodePointer
GetProcAddress
ExitProcess
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
HeapValidate
IsBadReadPtr
EncodePointer
TlsAlloc
TlsGetValue
WriteFile
GetOEMCP
GetCPInfo
IsValidCodePage
EnterCriticalSection
LeaveCriticalSection
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
IsDebuggerPresent
HeapAlloc
GetModuleFileNameA
HeapReAlloc
HeapSize
HeapQueryInformation
HeapFree
RtlUnwind
WideCharToMultiByte
LCMapStringW
MultiByteToWideChar
GetStringTypeW
WriteConsoleW
OutputDebugStringW
IsProcessorFeaturePresent
SetFilePointer
GetConsoleCP
RaiseException
SetStdHandle
CreateFileW
CloseHandle
FlushFileBuffers
gdi32
GetBitmapBits
Sections
.text Size: 187KB - Virtual size: 187KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 12.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.notuj Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.zawuwat Size: 512B - Virtual size: 75B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 42KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ