C:\mav.pdb
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_2a761bb12b50dc7ab5f4b6d5b8ab1c3f17d3f1d39f4fe26e3fe4a3cde21c89d8.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_2a761bb12b50dc7ab5f4b6d5b8ab1c3f17d3f1d39f4fe26e3fe4a3cde21c89d8.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_2a761bb12b50dc7ab5f4b6d5b8ab1c3f17d3f1d39f4fe26e3fe4a3cde21c89d8
-
Size
242KB
-
MD5
7b3d80fc9558e0087f546c82f87b3810
-
SHA1
794832d367e44686dc9488fd342d5f6959c730ab
-
SHA256
2a761bb12b50dc7ab5f4b6d5b8ab1c3f17d3f1d39f4fe26e3fe4a3cde21c89d8
-
SHA512
0cd3a0f366e006476355a8a8e09d6558a894ed01b071717730cb921315caa1ac4a85bcff1c28f91d78d81b4b6e1be661eb17b25c83ec9e4fb0fc26b9dfa15e3f
-
SSDEEP
6144:RvD9GxJa8fWFe/3T808AnaTpzNjMlO5FeT:BD9ka8f+e/LhnaFzNjM+e
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource JaffaCakes118_2a761bb12b50dc7ab5f4b6d5b8ab1c3f17d3f1d39f4fe26e3fe4a3cde21c89d8
Files
-
JaffaCakes118_2a761bb12b50dc7ab5f4b6d5b8ab1c3f17d3f1d39f4fe26e3fe4a3cde21c89d8.exe windows:5 windows x86 arch:x86
603ceb7a5da7da1d54a25934b0fee2e4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
HeapWalk
GetNamedPipeHandleStateW
SystemTimeToFileTime
FillConsoleOutputCharacterW
CreateMailslotA
TerminateProcess
GetLastError
GetVersionExA
FreeResource
EnumResourceNamesA
FindNextFileA
CopyFileExW
BuildCommDCBW
SetDefaultCommConfigA
SetCommConfig
WritePrivateProfileStructW
LocalCompact
ChangeTimerQueueTimer
ReadConsoleInputW
WriteConsoleInputA
LoadResource
AddAtomW
SearchPathA
GetThreadTimes
CallNamedPipeW
GetDriveTypeW
BuildCommDCBAndTimeoutsA
VirtualProtect
GetModuleHandleA
GlobalAlloc
SetThreadIdealProcessor
GetProfileSectionW
DeleteFileW
FindFirstChangeNotificationA
VerifyVersionInfoA
FormatMessageA
SetDllDirectoryW
LoadLibraryA
WritePrivateProfileStringW
GetUserDefaultLCID
SetWaitableTimer
SetConsoleTextAttribute
InterlockedDecrement
GetStartupInfoW
GetSystemWow64DirectoryA
CopyFileW
SetCalendarInfoA
ContinueDebugEvent
EndUpdateResourceW
SetLastError
FreeLibraryAndExitThread
GetModuleFileNameW
FatalAppExitA
SetSystemTime
OpenFileMappingA
lstrcmpW
WriteFileGather
FlushConsoleInputBuffer
SetDefaultCommConfigW
FindNextVolumeA
InterlockedExchangeAdd
GlobalUnfix
GetSystemWindowsDirectoryA
CopyFileA
GetACP
GlobalFindAtomW
lstrcatW
GetPrivateProfileStringW
SetMailslotInfo
CreateActCtxW
GetPrivateProfileIntW
_lwrite
OutputDebugStringW
CreateNamedPipeW
GetAtomNameA
SetConsoleActiveScreenBuffer
EnumResourceTypesA
lstrlenA
DebugActiveProcess
WriteConsoleW
lstrcpyA
ReadConsoleOutputW
GetThreadContext
ReleaseActCtx
GetStringTypeA
GetPrivateProfileStringA
GetDriveTypeA
GetFileAttributesExA
LocalFileTimeToFileTime
MoveFileW
GetVolumePathNameW
GetCommMask
SetFileShortNameW
VerLanguageNameW
LockFile
ProcessIdToSessionId
GetQueuedCompletionStatus
AllocConsole
GlobalGetAtomNameW
SetComputerNameA
GetConsoleAliasExesLengthA
WriteConsoleInputW
CreateMailslotW
SystemTimeToTzSpecificLocalTime
MoveFileWithProgressA
GetStringTypeExW
EnumSystemLocalesA
GetPrivateProfileIntA
GetModuleHandleW
OpenWaitableTimerA
GetConsoleAliasesLengthW
PeekNamedPipe
FillConsoleOutputCharacterA
GetCompressedFileSizeA
FindNextVolumeMountPointA
WriteConsoleOutputCharacterA
QueryInformationJobObject
GetConsoleAliasExesA
EnumDateFormatsA
VirtualAllocEx
OpenMutexA
RaiseException
GetCommandLineA
GetStartupInfoA
HeapValidate
IsBadReadPtr
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
Sleep
InterlockedIncrement
GetProcAddress
ExitProcess
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
HeapDestroy
HeapCreate
HeapFree
VirtualFree
WriteFile
HeapAlloc
HeapSize
HeapReAlloc
VirtualAlloc
GetOEMCP
GetCPInfo
IsValidCodePage
RtlUnwind
InitializeCriticalSectionAndSpinCount
DebugBreak
OutputDebugStringA
LoadLibraryW
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeW
GetLocaleInfoA
SetFilePointer
GetConsoleCP
GetConsoleMode
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
CreateFileA
CloseHandle
FlushFileBuffers
advapi32
InitiateSystemShutdownW
Sections
.text Size: 148KB - Virtual size: 147KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 71KB - Virtual size: 234KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 22KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ