C:\sazaduripidal69\rarexo\seyiroruf\sejiv_huj.pdb
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_155b69d0734426dc804a8596d9f3e45da629f6e2fd040c177235547dc1b9db62.exe
Resource
win7-20241010-en
General
-
Target
JaffaCakes118_155b69d0734426dc804a8596d9f3e45da629f6e2fd040c177235547dc1b9db62
-
Size
2.3MB
-
MD5
dfb0e0592d6c8dc938af4995ccb4a37b
-
SHA1
76fa2a835feae7216337aafb0424121441bb0fd2
-
SHA256
155b69d0734426dc804a8596d9f3e45da629f6e2fd040c177235547dc1b9db62
-
SHA512
d6947255c21347c34933e7b988a214ef00879d642cbea1396e6d0f772d4744e4a45e0f49d515f84c2cccabedf8e5ebe180d44ce3521f474efc0a3c2a409af6b7
-
SSDEEP
49152:HrPQpGqdb10mMVVrYKIoc6UzA0dchX0f93T0I52e5DI68fjNme4HPqw:UGqd3ic1A0CqQI57I6Oke4v
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource JaffaCakes118_155b69d0734426dc804a8596d9f3e45da629f6e2fd040c177235547dc1b9db62
Files
-
JaffaCakes118_155b69d0734426dc804a8596d9f3e45da629f6e2fd040c177235547dc1b9db62.exe windows:5 windows x86 arch:x86
51fc7b551f5af17b8b6571119d9fe03c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
InterlockedDecrement
GetSystemTimeAdjustment
VerSetConditionMask
SetLocaleInfoW
FindNextVolumeW
FindNextChangeNotification
CopyFileExW
MoveFileWithProgressW
GetProfileSectionW
VerifyVersionInfoW
LocalFlags
GetProcessPriorityBoost
FindFirstChangeNotificationA
GlobalGetAtomNameA
FindResourceExA
GetComputerNameExW
GetModuleHandleA
GetTempPathW
BuildCommDCBAndTimeoutsA
GetProcAddress
LoadLibraryA
ExitProcess
HeapAlloc
InitializeCriticalSection
EnumSystemLocalesW
DisableThreadLibraryCalls
FileTimeToLocalFileTime
GetProcessShutdownParameters
FindResourceW
GetOverlappedResult
GetPrivateProfileStructW
CreateFiber
EnumDateFormatsA
VirtualUnlock
GetTapeParameters
GetPrivateProfileIntA
GetAtomNameA
FlushConsoleInputBuffer
SetProcessAffinityMask
GetCPInfoExW
SetThreadContext
lstrlenA
SetConsoleCtrlHandler
GlobalGetAtomNameW
QueryInformationJobObject
lstrcpynA
WriteConsoleW
GetBinaryTypeW
SearchPathA
GetCommandLineA
VerifyVersionInfoA
GetCalendarInfoW
GetConsoleTitleA
CreateActCtxW
FormatMessageA
GetModuleHandleW
GetConsoleAliasA
InterlockedIncrement
LoadLibraryW
InterlockedExchange
FindActCtxSectionGuid
SetConsoleCursorInfo
UnregisterWait
GlobalAlloc
GetFileType
SetLastError
SetProcessPriorityBoost
GetMailslotInfo
GetSystemDefaultUILanguage
GetPrivateProfileStructA
OpenMutexA
GetLastError
HeapReAlloc
GetStartupInfoA
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
HeapCreate
VirtualFree
HeapFree
VirtualAlloc
SetUnhandledExceptionFilter
Sleep
WriteFile
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
GetCurrentThreadId
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
IsDebuggerPresent
InitializeCriticalSectionAndSpinCount
RtlUnwind
LCMapStringA
MultiByteToWideChar
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
HeapSize
user32
CharUpperW
gdi32
SelectObject
Sections
.text Size: 45KB - Virtual size: 44KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 2.3MB - Virtual size: 3.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 34KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ