C:\pituve.pdb
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_364ae9c5cdf3bf4e477155a84d1a18d43c74074891819cff85d9741ad5a9f5c3.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_364ae9c5cdf3bf4e477155a84d1a18d43c74074891819cff85d9741ad5a9f5c3.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_364ae9c5cdf3bf4e477155a84d1a18d43c74074891819cff85d9741ad5a9f5c3
-
Size
295KB
-
MD5
bf217862842c46b8757f366e820a86f0
-
SHA1
8a0f595178acd3e2ccda4c7d50d18cd76aa8eb2e
-
SHA256
364ae9c5cdf3bf4e477155a84d1a18d43c74074891819cff85d9741ad5a9f5c3
-
SHA512
357b54ce1b33dcaa7df998154cb8c0d0507d23b350428f2377f6c68be05f07af117fa3d4b460f9874da5acee4eb5805d0e58b7ae0faf41af64f348c275a2a02b
-
SSDEEP
6144:tEPes46o9a0hKGJXjasSXuZet0yy8coHPk85Gm:tG46o9a8JXGsSXuZet0yy8c185z
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource JaffaCakes118_364ae9c5cdf3bf4e477155a84d1a18d43c74074891819cff85d9741ad5a9f5c3
Files
-
JaffaCakes118_364ae9c5cdf3bf4e477155a84d1a18d43c74074891819cff85d9741ad5a9f5c3.exe windows:5 windows x86 arch:x86
ee6524c22cc0cf74d4c47508c44cd3e2
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
UnregisterWait
SetCriticalSectionSpinCount
HeapCompact
lstrcmpA
FindFirstFileW
FindFirstChangeNotificationW
EnumCalendarInfoA
WriteConsoleInputW
IsBadStringPtrW
EnumDateFormatsExW
CopyFileExW
GetNumaProcessorNode
TlsGetValue
SetLocalTime
UnmapViewOfFile
MoveFileExA
CommConfigDialogA
GetNumberOfConsoleInputEvents
GetConsoleAliasExesLengthA
SetErrorMode
FindResourceW
SetUnhandledExceptionFilter
LoadLibraryExW
SetDllDirectoryW
InterlockedIncrement
GetQueuedCompletionStatus
VerSetConditionMask
ReadConsoleA
InterlockedDecrement
WaitNamedPipeA
SetMailslotInfo
WritePrivateProfileSectionA
SetDefaultCommConfigW
SetFirmwareEnvironmentVariableA
CreateJobObjectW
GlobalLock
AddConsoleAliasW
SetVolumeMountPointW
GetComputerNameW
OpenSemaphoreA
CreateHardLinkA
GetFileAttributesExA
_lclose
GetModuleHandleW
GetTickCount
GetCommConfig
CreateNamedPipeW
GetProcessHeap
IsBadReadPtr
GetConsoleAliasesLengthA
GetSystemTimeAsFileTime
GetPrivateProfileStringW
GetConsoleTitleA
CreateRemoteThread
GetCompressedFileSizeW
EnumTimeFormatsA
SetCommState
GetSystemWow64DirectoryA
CreateActCtxW
WaitForMultipleObjectsEx
InitializeCriticalSection
GetProcessTimes
TlsSetValue
AllocateUserPhysicalPages
OpenProcess
FindResourceExA
FatalAppExitW
GetThreadSelectorEntry
GetCalendarInfoW
GetCalendarInfoA
ReadFileScatter
SetSystemTimeAdjustment
GetSystemWindowsDirectoryA
ReadConsoleOutputW
SetConsoleCP
DeleteVolumeMountPointW
InterlockedPopEntrySList
GetFileAttributesA
lstrcpynW
SetConsoleMode
GetVolumePathNamesForVolumeNameW
CreateSemaphoreA
SetConsoleCursorPosition
VerifyVersionInfoA
TerminateProcess
GetAtomNameW
IsDBCSLeadByte
GetModuleFileNameW
lstrcatA
QueryInformationJobObject
GetBinaryTypeW
GetVolumePathNameA
lstrlenW
GetPrivateProfileSectionNamesW
GlobalUnlock
VirtualUnlock
GetTempPathW
GetStringTypeExA
GetNamedPipeHandleStateW
GetLargestConsoleWindowSize
GetPrivateProfileIntW
VerifyVersionInfoW
InterlockedExchange
ReleaseActCtx
SetCurrentDirectoryA
GetStdHandle
FindFirstFileA
FreeLibraryAndExitThread
GetLastError
ChangeTimerQueueTimer
BackupRead
BindIoCompletionCallback
GetProcAddress
GetLongPathNameA
HeapSize
CreateJobSet
LocalLock
LockFileEx
EnterCriticalSection
VerLanguageNameW
SearchPathA
BuildCommDCBW
FindClose
LoadLibraryA
Process32FirstW
OpenMutexA
ProcessIdToSessionId
LocalAlloc
MoveFileA
BuildCommDCBAndTimeoutsW
GetExitCodeThread
GetNumberFormatW
SetCurrentDirectoryW
SetFileApisToANSI
QueryDosDeviceW
HeapWalk
GetPrivateProfileStructA
GetTapeParameters
SetNamedPipeHandleState
SetEnvironmentVariableA
GetVolumePathNamesForVolumeNameA
GetDefaultCommConfigA
WriteProfileStringA
WTSGetActiveConsoleSessionId
EnumDateFormatsA
WaitCommEvent
FindFirstChangeNotificationA
GetProcessShutdownParameters
QueueUserWorkItem
ContinueDebugEvent
IsDebuggerPresent
FatalExit
FreeEnvironmentStringsW
EnumResourceNamesA
FindNextFileW
WriteProfileStringW
VirtualProtect
EnumDateFormatsW
CompareStringA
FatalAppExitA
PeekConsoleInputA
DeleteCriticalSection
WriteConsoleOutputAttribute
OutputDebugStringA
DuplicateHandle
FindFirstVolumeA
GetVersionExA
TlsAlloc
TerminateJobObject
CloseHandle
GetVersion
DeleteTimerQueueTimer
GlobalAddAtomW
SetFileValidData
FindActCtxSectionStringW
ResetWriteWatch
UnregisterWaitEx
ReadConsoleOutputCharacterW
TlsFree
GetProfileSectionW
EnumSystemLocalesW
lstrcpyW
CopyFileExA
LocalFileTimeToFileTime
CreateFileW
SetStdHandle
GetFullPathNameA
GetThreadContext
WritePrivateProfileStringW
ExitProcess
RaiseException
GetCommandLineW
HeapSetInformation
GetStartupInfoW
QueryPerformanceCounter
GetCurrentThreadId
GetCurrentProcessId
DecodePointer
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
HeapValidate
EncodePointer
SetLastError
HeapCreate
WriteFile
GetACP
GetOEMCP
GetCPInfo
IsValidCodePage
LeaveCriticalSection
LoadLibraryW
GetCurrentProcess
UnhandledExceptionFilter
HeapAlloc
GetModuleFileNameA
HeapReAlloc
HeapQueryInformation
HeapFree
RtlUnwind
WideCharToMultiByte
LCMapStringW
MultiByteToWideChar
GetStringTypeW
WriteConsoleW
OutputDebugStringW
IsProcessorFeaturePresent
SetFilePointer
GetConsoleCP
GetConsoleMode
FlushFileBuffers
user32
GetMessageTime
gdi32
GetBitmapBits
advapi32
GetFileSecurityW
msimg32
AlphaBlend
Sections
.text Size: 193KB - Virtual size: 193KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 23.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 26KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 69KB - Virtual size: 69KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ