C:\jacew\tedatazotom\cacazipayuz\zotu zikezase\44.pdb
Static task
static1
Behavioral task
behavioral1
Sample
07e6ea7c38621a02b0540b002de5c54b741755aa99e180826a67cfad67b7ed6c.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
07e6ea7c38621a02b0540b002de5c54b741755aa99e180826a67cfad67b7ed6c.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_1ff08fb34d5742e1c7b20a39e9f246770487c74638683a2d427b52ffad9636ea
-
Size
119KB
-
MD5
9594dc62f637f4dbfc45602890c0a610
-
SHA1
9b28ea147ee6685555658b49e5e7db7903198583
-
SHA256
1ff08fb34d5742e1c7b20a39e9f246770487c74638683a2d427b52ffad9636ea
-
SHA512
050570f6ff8e2629c7b4ee525d283da959e9b965682e87c4c1677b88c90606582c352d175c7c0977a390b7481d74e4b3f7c099676545a168bf0e3881ba5faeb5
-
SSDEEP
3072:bAu5Mh+BlzEwKgrJVNbdXVDlbuVxn6+u6xGQAZ/M0bo4lkK:0uWh+BJzKwHX/uVch60pZVo4P
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/07e6ea7c38621a02b0540b002de5c54b741755aa99e180826a67cfad67b7ed6c
Files
-
JaffaCakes118_1ff08fb34d5742e1c7b20a39e9f246770487c74638683a2d427b52ffad9636ea.zip
-
07e6ea7c38621a02b0540b002de5c54b741755aa99e180826a67cfad67b7ed6c.exe windows:5 windows x86 arch:x86
44ee62a4400af83b87d8ba40d9bab42b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
WriteConsoleInputW
SetComputerNameExA
GetStringTypeA
OpenJobObjectA
ReadConsoleA
GetConsoleAliasA
InterlockedDecrement
GetProfileSectionA
EnumCalendarInfoExW
GetConsoleAliasesA
GetConsoleAliasesLengthA
CreateRemoteThread
SetFileTime
FindResourceExA
TerminateThread
GetLocaleInfoW
GetFileAttributesA
GetAtomNameW
GetModuleFileNameW
ReleaseSemaphore
GetLastError
GetProcAddress
GetLongPathNameA
VirtualAlloc
WriteConsoleA
LocalAlloc
DnsHostnameToComputerNameA
GetFileType
HeapLock
GetModuleFileNameA
GetDefaultCommConfigA
SetConsoleTitleW
GetModuleHandleA
GetConsoleTitleW
GetVersionExA
ReadConsoleInputW
ResetWriteWatch
CreateThread
CreateMailslotW
FileTimeToDosDateTime
HeapAlloc
GetCommandLineA
GetStartupInfoA
RaiseException
RtlUnwind
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapFree
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
VirtualFree
HeapReAlloc
HeapCreate
GetModuleHandleW
Sleep
ExitProcess
WriteFile
GetStdHandle
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
SetHandleCount
SetFilePointer
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetConsoleCP
GetConsoleMode
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
InitializeCriticalSectionAndSpinCount
LoadLibraryA
CloseHandle
CreateFileA
SetStdHandle
FlushFileBuffers
HeapSize
GetConsoleOutputCP
WriteConsoleW
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeW
GetLocaleInfoA
SetEndOfFile
GetProcessHeap
ReadFile
user32
SetCaretPos
advapi32
AdjustTokenGroups
Sections
.text Size: 70KB - Virtual size: 69KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 136KB - Virtual size: 160KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 57KB - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ