C:\bigal vegiwe_yevekef.pdb
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_0ad22c62ad6c2d47a67e6363c4c581b4484535a1037dca85c0e6c56793130034.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_0ad22c62ad6c2d47a67e6363c4c581b4484535a1037dca85c0e6c56793130034
-
Size
383KB
-
MD5
fca659ae151e9601e395311c80affaf3
-
SHA1
4267eba1fd55cba76e72d239d32b44d7415ef0c7
-
SHA256
0ad22c62ad6c2d47a67e6363c4c581b4484535a1037dca85c0e6c56793130034
-
SHA512
c74044ee4f85a07a318a20830d39551fdb95dec61794f1cba6d71d2d4d76f5290ee3b191eb8c69a0cac7bd8a1229bc95111d7640abf9d66bdfc95b2bbfa512fa
-
SSDEEP
6144:kPOoI3LsLwU9DjVOxnbLdWdR+sVEPQs6FU6KdAHuzbgwuO0Q7ITsqpTmZwVfT:kP5I3Lo59OxbLdWQIvUwunnwQ7OT
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource JaffaCakes118_0ad22c62ad6c2d47a67e6363c4c581b4484535a1037dca85c0e6c56793130034
Files
-
JaffaCakes118_0ad22c62ad6c2d47a67e6363c4c581b4484535a1037dca85c0e6c56793130034.exe windows:5 windows x86 arch:x86
2d5790430fb01de6c713c28f69c817bd
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
SetMailslotInfo
GetFileAttributesExA
LocalFlags
GetConsoleAliasesA
GlobalAlloc
LoadLibraryW
InterlockedPopEntrySList
LeaveCriticalSection
WriteConsoleW
lstrlenW
GetShortPathNameA
CreateDirectoryA
GetCPInfoExW
FillConsoleOutputCharacterW
SetLastError
SetConsoleTextAttribute
WriteProfileSectionA
SetStdHandle
LoadLibraryA
MoveFileA
SetProcessWorkingSetSize
GetModuleFileNameA
FindFirstChangeNotificationA
GetConsoleTitleW
VirtualProtect
SetCalendarInfoA
GetConsoleAliasesLengthW
WriteConsoleOutputCharacterA
GetLongPathNameA
UnregisterWait
CloseHandle
HeapSize
GetCommandLineW
HeapSetInformation
GetStartupInfoW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EncodePointer
DecodePointer
TerminateProcess
GetCurrentProcess
HeapAlloc
GetLastError
HeapFree
IsProcessorFeaturePresent
EnterCriticalSection
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
GetProcAddress
GetModuleHandleW
ExitProcess
WriteFile
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
GetCurrentThreadId
InterlockedDecrement
HeapCreate
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
RaiseException
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
Sleep
WideCharToMultiByte
RtlUnwind
LCMapStringW
MultiByteToWideChar
GetStringTypeW
HeapReAlloc
GetConsoleCP
GetConsoleMode
FlushFileBuffers
SetFilePointer
CreateFileW
gdi32
GetTextExtentExPointA
ole32
CoFileTimeNow
Sections
.text Size: 231KB - Virtual size: 230KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 25KB - Virtual size: 289KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.fuhosev Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rutemo Size: 1024B - Virtual size: 624B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.sawehe Size: 512B - Virtual size: 23B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.taciwa Size: 1024B - Virtual size: 963B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 120KB - Virtual size: 120KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ