C:\sehubitakilewi\rakuxo\sijuculigu momov\senefinig16\fanadawi69.pdb
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_9d324da8874bf18aae363a521f47adb886165ed9a6fb99ca0ff8f112bb78a1e3.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_9d324da8874bf18aae363a521f47adb886165ed9a6fb99ca0ff8f112bb78a1e3.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_9d324da8874bf18aae363a521f47adb886165ed9a6fb99ca0ff8f112bb78a1e3
-
Size
286KB
-
MD5
c8db952495476598e4a9e817faa66bd3
-
SHA1
bf87819d97967eb84812028e724acccbecc308c6
-
SHA256
9d324da8874bf18aae363a521f47adb886165ed9a6fb99ca0ff8f112bb78a1e3
-
SHA512
1ba0653a1489761d66042f8732532d028a51dd50734d2188eeb54157cde4498e4ac5322067e75b768176f060f04cc65c4178c3bb06447192133e9be54510f427
-
SSDEEP
6144:yK8kEQgA+ApiK1eO0CICsClp+TV6T0YeMx:WQbH3/ICsClp+wQY
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource JaffaCakes118_9d324da8874bf18aae363a521f47adb886165ed9a6fb99ca0ff8f112bb78a1e3
Files
-
JaffaCakes118_9d324da8874bf18aae363a521f47adb886165ed9a6fb99ca0ff8f112bb78a1e3.exe windows:5 windows x86 arch:x86
a5effb4de201aefae267d5eef9a314ac
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
SetDllDirectoryW
_lwrite
InterlockedDecrement
GetNamedPipeHandleStateA
SetHandleInformation
SetConsoleScreenBufferSize
CancelWaitableTimer
SetVolumeMountPointW
FindFirstFileExW
FreeEnvironmentStringsA
GetModuleHandleW
GetSystemTimeAsFileTime
GetPrivateProfileStringW
ReadConsoleW
GetSystemWow64DirectoryA
QueryActCtxW
CreateActCtxW
ActivateActCtx
GlobalAlloc
GlobalFindAtomA
LoadLibraryW
GetConsoleMode
ReadConsoleInputA
SizeofResource
GetSystemWindowsDirectoryA
SetConsoleMode
HeapValidate
GetVolumePathNamesForVolumeNameW
IsDBCSLeadByte
GetModuleFileNameW
GetSystemDirectoryA
CompareStringW
GetStartupInfoW
TlsGetValue
GetLastError
SetLastError
GetProcAddress
SetFirmwareEnvironmentVariableW
CreateNamedPipeA
IsValidCodePage
CopyFileA
GlobalGetAtomNameA
SearchPathA
GetPrivateProfileStringA
OpenWaitableTimerA
WritePrivateProfileStringA
WTSGetActiveConsoleSessionId
SetConsoleCursorInfo
GetProcessShutdownParameters
BuildCommDCBA
GetCurrentDirectoryA
GetFileTime
GetVersionExA
GetWindowsDirectoryW
FileTimeToLocalFileTime
TlsFree
GetProfileSectionW
CommConfigDialogW
LocalFileTimeToFileTime
GetConsoleAliasesLengthW
VerifyVersionInfoW
DeleteFileA
GetCommandLineA
HeapSetInformation
EnterCriticalSection
LeaveCriticalSection
DecodePointer
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EncodePointer
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
InterlockedIncrement
ExitProcess
GetModuleFileNameA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
IsBadReadPtr
TlsAlloc
TlsSetValue
HeapCreate
WriteFile
GetACP
GetOEMCP
GetCPInfo
OutputDebugStringA
WriteConsoleW
OutputDebugStringW
RtlUnwind
SetFilePointer
GetConsoleCP
HeapAlloc
HeapReAlloc
HeapSize
HeapQueryInformation
HeapFree
FlushFileBuffers
GetStringTypeW
LCMapStringW
MultiByteToWideChar
IsProcessorFeaturePresent
SetStdHandle
CloseHandle
CreateFileW
RaiseException
user32
GetMenuInfo
GetMessageTime
GetListBoxInfo
gdi32
GetBitmapBits
Sections
.text Size: 197KB - Virtual size: 197KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 39.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 66KB - Virtual size: 66KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ