C:\zawukoxixaka-cokecexitosido.pdb
Static task
static1
Behavioral task
behavioral1
Sample
5d3df0a18dce44d82712f8304784c53dcd880ddece5cc4bbf19720150ae4ffc8.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
5d3df0a18dce44d82712f8304784c53dcd880ddece5cc4bbf19720150ae4ffc8.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_1b67228067476adba101405a8a977dc25acb4080c0e2f49674aa412185fc5804
-
Size
245KB
-
MD5
8a4849e5be425f9c2cdf4dd69e428ddb
-
SHA1
886b2751d70f7e365a8915b24fedac89d21f3202
-
SHA256
1b67228067476adba101405a8a977dc25acb4080c0e2f49674aa412185fc5804
-
SHA512
2ccbffeb0aa1e4de832edc960d01848ae7aa432c793954e176a59a624930c31a43610503047944f6e56d6690a256f7ebbf247a4de197fbfdf7a35476c27816a1
-
SSDEEP
3072:8mpWOkQd18axeTE0FJQgz2TiJ5UmHkR0+XaHSwUKFiVvvWaK2MADaR4cLomEr/qR:8m3ffaHki/RHkuiVFK2M8aR/RESNiHe9
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/5d3df0a18dce44d82712f8304784c53dcd880ddece5cc4bbf19720150ae4ffc8
Files
-
JaffaCakes118_1b67228067476adba101405a8a977dc25acb4080c0e2f49674aa412185fc5804.zip
Password: infected
-
5d3df0a18dce44d82712f8304784c53dcd880ddece5cc4bbf19720150ae4ffc8.exe windows:5 windows x86 arch:x86
d6f5b07d6c7146f4552b8cbdcd8f00b9
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetCurrentDirectoryA
SearchPathA
GetNumberFormatW
PeekConsoleInputA
ReadFile
CreateFileW
lstrlenA
OutputDebugStringW
WriteConsoleW
SetFilePointerEx
FlushFileBuffers
SetStdHandle
HeapReAlloc
GetCPInfo
CreateMailslotW
FormatMessageW
GetTickCount
GetHandleInformation
CloseHandle
LockFile
ExitProcess
TerminateProcess
GetBinaryTypeA
VirtualProtect
LocalAlloc
GlobalMemoryStatus
GlobalAlloc
GetStringTypeW
GetProcAddress
EncodePointer
DecodePointer
RaiseException
RtlUnwind
GetCommandLineW
IsProcessorFeaturePresent
GetLastError
HeapAlloc
HeapFree
GetModuleHandleExW
MultiByteToWideChar
WideCharToMultiByte
HeapSize
IsDebuggerPresent
EnterCriticalSection
LeaveCriticalSection
WriteFile
GetConsoleCP
GetConsoleMode
SetLastError
GetCurrentThreadId
GetProcessHeap
GetStdHandle
GetFileType
DeleteCriticalSection
GetStartupInfoW
GetModuleFileNameW
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetEnvironmentStringsW
FreeEnvironmentStringsW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
Sleep
GetCurrentProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleW
LCMapStringW
LoadLibraryExW
IsValidCodePage
GetACP
GetOEMCP
ReadConsoleW
user32
UserHandleGrantAccess
MessageBoxExA
EnumPropsW
SetWindowRgn
DrawIcon
CreateAcceleratorTableW
GetClassInfoW
SendMessageA
GetMessageW
gdi32
PathToRegion
GdiComment
GetEnhMetaFileHeader
SetMapMode
GetDCBrushColor
ExtFloodFill
OffsetViewportOrgEx
advapi32
LockServiceDatabase
EnumDependentServicesW
RegRestoreKeyW
ConvertToAutoInheritPrivateObjectSecurity
GetSecurityDescriptorControl
NotifyBootConfigStatus
Sections
.text Size: 91KB - Virtual size: 90KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 46KB - Virtual size: 46KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 8.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 77KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 13.2MB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ