C:\viwavuzuj\zec\vukejadu.pdb
Static task
static1
Behavioral task
behavioral1
Sample
38a30aee82cdd8e5338e168d99fdce7b8e032a89da64e48751b2e45f9d50ad13.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
38a30aee82cdd8e5338e168d99fdce7b8e032a89da64e48751b2e45f9d50ad13.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_73a8b9c09314a9b07e418584d3f1702ca82a96054227a68abf00cd0488b15d44
-
Size
194KB
-
MD5
d395bddf3f07e8a5c9e2bcf4a513f231
-
SHA1
d2fc6393f11b7441a7630ba54a74edc8da3a8e9a
-
SHA256
73a8b9c09314a9b07e418584d3f1702ca82a96054227a68abf00cd0488b15d44
-
SHA512
a9929fe07ae09c178ffed83a5658f02a4521aab8eebc78afe41cea1d40b90b02f69f3e933d788b2ad3210dbb1b0e267987708dfcb9f55d4c5abde875a9cd082e
-
SSDEEP
6144:pLcuqP+dIAbxkgStJvCwENs7DOmLPj2JX:Zm76nWFaJX
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/38a30aee82cdd8e5338e168d99fdce7b8e032a89da64e48751b2e45f9d50ad13
Files
-
JaffaCakes118_73a8b9c09314a9b07e418584d3f1702ca82a96054227a68abf00cd0488b15d44.zip
-
38a30aee82cdd8e5338e168d99fdce7b8e032a89da64e48751b2e45f9d50ad13.exe windows:5 windows x86 arch:x86
ecfb8ce0d70668868f462672b03acee3
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
LoadLibraryA
GetComputerNameExA
WriteProfileSectionA
GetNumaProcessorNode
FindFirstVolumeA
SetConsoleCursorInfo
HeapUnlock
FindFirstChangeNotificationA
WaitForSingleObject
GetNamedPipeHandleStateW
FileTimeToDosDateTime
EnumResourceTypesW
EnumResourceNamesW
ExitProcess
TerminateProcess
ActivateActCtx
GetVersionExA
VerifyVersionInfoW
SetConsoleOutputCP
ResetEvent
FindNextFileW
GetCompressedFileSizeW
CopyFileExA
ReadConsoleOutputCharacterA
GetDefaultCommConfigW
VerLanguageNameA
_hread
SetCommConfig
WritePrivateProfileStructA
FreeEnvironmentStringsW
CreateTimerQueueTimer
FindVolumeClose
LeaveCriticalSection
WriteConsoleInputA
TlsGetValue
SetComputerNameExW
FindAtomA
ReleaseMutex
LocalUnlock
CallNamedPipeW
BuildCommDCBAndTimeoutsA
VirtualProtect
LocalAlloc
GetCommandLineA
InterlockedIncrement
CopyFileA
AddRefActCtx
OutputDebugStringW
FormatMessageW
GetPriorityClass
WritePrivateProfileStringW
GetSystemDefaultLangID
TerminateThread
GlobalUnfix
GetVersionExW
HeapValidate
_hwrite
GetWindowsDirectoryW
GetStartupInfoA
CreatePipe
GetCPInfoExW
GetSystemWindowsDirectoryW
GetSystemWow64DirectoryA
GetLastError
GetCalendarInfoW
WaitForDebugEvent
GetTickCount
DeleteVolumeMountPointW
OpenFileMappingW
ContinueDebugEvent
CreateActCtxW
SetMailslotInfo
AddConsoleAliasA
GetPrivateProfileIntW
ReadConsoleInputW
InterlockedDecrement
DefineDosDeviceA
SetVolumeMountPointA
SetThreadIdealProcessor
SetConsoleActiveScreenBuffer
SetProcessAffinityMask
SetThreadContext
GetLongPathNameW
SetConsoleTextAttribute
LoadLibraryW
EndUpdateResourceW
MoveFileW
ReadConsoleA
WriteConsoleA
InterlockedFlushSList
WritePrivateProfileSectionA
GetPrivateProfileStructA
DeleteCriticalSection
GetPrivateProfileSectionNamesA
GetDriveTypeA
GetFileAttributesExA
LocalFileTimeToFileTime
GetVolumePathNameA
GetConsoleMode
HeapSetInformation
GetComputerNameA
FindActCtxSectionStringA
ReadProcessMemory
MoveFileExW
DisableThreadLibraryCalls
GlobalFix
WriteConsoleInputW
GlobalDeleteAtom
GetEnvironmentStrings
InterlockedCompareExchange
WaitNamedPipeW
GetPrivateProfileStructW
GetExitCodeProcess
GetSystemTime
GetLocalTime
EnumCalendarInfoExA
FreeEnvironmentStringsA
GetPrivateProfileStringA
CreateIoCompletionPort
OpenSemaphoreW
GetMailslotInfo
GetCommModemStatus
lstrcpyA
HeapWalk
LockFile
EndUpdateResourceA
VerSetConditionMask
GetConsoleCP
GetConsoleAliasW
GetNumberOfConsoleInputEvents
GetProfileStringA
GetQueuedCompletionStatus
AllocConsole
FindAtomW
GetNumaNodeProcessorMask
GetConsoleAliasExesLengthA
CreateMailslotW
EnumDateFormatsW
SetCommState
FileTimeToLocalFileTime
IsDebuggerPresent
GetSystemTimeAdjustment
_lread
GetConsoleAliasExesLengthW
GetWriteWatch
GetPrivateProfileStringW
GetModuleHandleA
ReadConsoleOutputAttribute
GetFileInformationByHandle
GetProfileStringW
MoveFileA
CreateActCtxA
SetCommMask
SetMessageWaitingIndicator
AreFileApisANSI
OpenWaitableTimerW
GetProcessShutdownParameters
PeekNamedPipe
FillConsoleOutputCharacterA
FindNextVolumeMountPointA
GetThreadPriority
DeleteAtom
AddAtomW
WriteConsoleOutputCharacterA
QueryDosDeviceA
GetConsoleAliasExesW
GetBinaryTypeA
Sleep
InitializeCriticalSection
EnterCriticalSection
RaiseException
RtlUnwind
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetModuleFileNameW
WideCharToMultiByte
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetCPInfo
IsBadReadPtr
GetProcAddress
GetModuleHandleW
TlsAlloc
TlsSetValue
GetCurrentThreadId
TlsFree
SetLastError
DebugBreak
GetStdHandle
WriteFile
OutputDebugStringA
WriteConsoleW
GetFileType
CloseHandle
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetModuleFileNameA
GetEnvironmentStringsW
SetHandleCount
HeapDestroy
HeapCreate
HeapFree
VirtualFree
GetACP
GetOEMCP
IsValidCodePage
GetLocaleInfoA
GetStringTypeA
GetStringTypeW
HeapAlloc
HeapSize
HeapReAlloc
VirtualAlloc
IsValidLocale
EnumSystemLocalesA
GetUserDefaultLCID
FlushFileBuffers
InitializeCriticalSectionAndSpinCount
SetStdHandle
GetLocaleInfoW
GetConsoleOutputCP
SetFilePointer
CreateFileA
user32
OemToCharW
Sections
.text Size: 234KB - Virtual size: 233KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 68KB - Virtual size: 587KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 29KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ