C:\domahucekifan45-t.pdb
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_54f72f49e14040b70a9951650a019694bb185b1d67df595bc52222efd616c9cc.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
JaffaCakes118_54f72f49e14040b70a9951650a019694bb185b1d67df595bc52222efd616c9cc.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_54f72f49e14040b70a9951650a019694bb185b1d67df595bc52222efd616c9cc
-
Size
337KB
-
MD5
bbde29fcae02fb3c1659b24259fae809
-
SHA1
96f9d2ee5a1d9b5a32df367b46193f449c348af0
-
SHA256
54f72f49e14040b70a9951650a019694bb185b1d67df595bc52222efd616c9cc
-
SHA512
197d987b4a6779a046066f2d940a107e191e7a15e319fb01162fe120148753f627dc6900b6c2f513764518285c6ab6c338bde302efd6062918a9607d961cf234
-
SSDEEP
3072:LIb0cBNDSBFEXIx07XLWt1zdHbRjMen4H+wgXJ+8wHq0RXtWpbePRX19j/Te8Yt+:OvIqbWt1zhbrjwf8A3RXIpbsNTBYj3i
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource JaffaCakes118_54f72f49e14040b70a9951650a019694bb185b1d67df595bc52222efd616c9cc
Files
-
JaffaCakes118_54f72f49e14040b70a9951650a019694bb185b1d67df595bc52222efd616c9cc.exe windows:5 windows x86 arch:x86
f9c2e6a1a2085a9fa6c1b7d773af20c4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
FindFirstVolumeA
WaitForSingleObject
GetNamedPipeHandleStateA
CreateNamedPipeW
CallNamedPipeW
TerminateThread
FatalExit
GetVersionExA
CopyFileExW
SetConsoleCP
VerifyVersionInfoA
VerLanguageNameA
FindFirstFileExW
FreeEnvironmentStringsW
SetProcessPriorityBoost
SetVolumeMountPointA
GetLongPathNameW
CopyFileA
TlsSetValue
VerifyVersionInfoW
GetConsoleCursorInfo
TzSpecificLocalTimeToSystemTime
GetProcessShutdownParameters
ReleaseSemaphore
BuildCommDCBAndTimeoutsW
GetProcAddress
GetModuleHandleA
GlobalAlloc
Sleep
TlsGetValue
MoveFileW
GetCommandLineW
InterlockedExchange
DeleteFileA
CreateActCtxW
SetFileAttributesA
GetPrivateProfileIntW
HeapValidate
GetProcessHeap
CreateNamedPipeA
WriteConsoleOutputW
GetStartupInfoA
GetDiskFreeSpaceExW
GetCPInfoExW
GetWindowsDirectoryA
GetSystemWow64DirectoryA
SetLastError
GetProfileStringW
GetCalendarInfoA
GetTickCount
GetExitCodeThread
DebugBreak
FindFirstFileA
ReadFileScatter
ReadFile
GetNumberOfConsoleMouseButtons
GetSystemWow64DirectoryW
WriteProfileStringA
lstrcatW
CreateActCtxA
InterlockedPopEntrySList
DefineDosDeviceA
WriteConsoleW
InterlockedDecrement
SetSystemTimeAdjustment
HeapWalk
SetErrorMode
PeekConsoleInputA
GetNumberFormatW
GetQueuedCompletionStatus
FreeEnvironmentStringsA
SetLocalTime
FindResourceExW
CreateSemaphoreW
HeapSetInformation
SetFileShortNameA
lstrcpyA
ReplaceFileW
LockFile
MoveFileExW
GetConsoleCP
GetVolumePathNameW
SetConsoleScreenBufferSize
FreeConsole
GetConsoleAliasExesLengthW
WriteConsoleInputW
LocalLock
SetCommState
GetSystemTimeAdjustment
EnumSystemLocalesW
GetNumaHighestNodeNumber
SetEndOfFile
ChangeTimerQueueTimer
GetWriteWatch
RaiseException
OpenSemaphoreW
GetLargestConsoleWindowSize
ClearCommError
ReleaseActCtx
GetComputerNameW
GetLastError
OpenMutexW
GetStringTypeA
VirtualUnlock
SetWaitableTimer
CreateTimerQueueTimer
GetProcessTimes
IsBadWritePtr
FatalAppExitA
lstrcpynW
SetNamedPipeHandleState
FillConsoleOutputCharacterW
GetCompressedFileSizeA
FindNextVolumeMountPointW
GetFullPathNameA
WriteProfileStringW
LockFileEx
LeaveCriticalSection
SetCurrentDirectoryA
GlobalAddAtomW
ReadFileEx
EncodePointer
DecodePointer
GetStartupInfoW
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetModuleFileNameW
IsBadReadPtr
IsProcessorFeaturePresent
TlsAlloc
GetCurrentThreadId
TlsFree
GetModuleHandleW
InterlockedIncrement
ExitProcess
WriteFile
GetStdHandle
EnterCriticalSection
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetEnvironmentStringsW
HeapCreate
SetFilePointer
WideCharToMultiByte
GetConsoleMode
OutputDebugStringA
OutputDebugStringW
LoadLibraryW
MultiByteToWideChar
GetACP
GetOEMCP
GetCPInfo
IsValidCodePage
HeapAlloc
GetModuleFileNameA
HeapReAlloc
HeapSize
HeapQueryInformation
HeapFree
RtlUnwind
SetStdHandle
GetStringTypeW
LCMapStringW
FlushFileBuffers
CreateFileW
CloseHandle
user32
GetComboBoxInfo
GetAltTabInfoA
Sections
.text Size: 239KB - Virtual size: 238KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 54KB - Virtual size: 558KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ