C:\vikohuh\dizefuy17 xura.pdb
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_8ccc2337fc52470557a28e597122bfd6b4216f86a478ab5300ecc09432a17d30.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_8ccc2337fc52470557a28e597122bfd6b4216f86a478ab5300ecc09432a17d30.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_8ccc2337fc52470557a28e597122bfd6b4216f86a478ab5300ecc09432a17d30
-
Size
319KB
-
MD5
12ba89f5ac89a6addcd1f15b1c16af05
-
SHA1
a8e8095cb2e1fe8333e86c6315703c56c76f5600
-
SHA256
8ccc2337fc52470557a28e597122bfd6b4216f86a478ab5300ecc09432a17d30
-
SHA512
4c950848fc6af3f2854da5856717c7f150222378547962f91e9a61c6c7fc91eecae9bb12c53b36581fc99fb15edc10add4d205ec367c4a2e6a26bee2d1f8d4d4
-
SSDEEP
3072:Uxyir0spfxtTM/B0OgS7NHfzlngAq0zSRytHb6GG+OX9qqyMg3VkPyiRXQi5bFs2:O1tSTgS7xLBTbzyytH22OtZyZ3ViRXc
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource JaffaCakes118_8ccc2337fc52470557a28e597122bfd6b4216f86a478ab5300ecc09432a17d30
Files
-
JaffaCakes118_8ccc2337fc52470557a28e597122bfd6b4216f86a478ab5300ecc09432a17d30.exe windows:5 windows x86 arch:x86
5bf1109d17f31fdf1287dd3cc8a8bd45
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
_lwrite
InterlockedDecrement
SetFirmwareEnvironmentVariableA
GetNamedPipeHandleStateA
SetHandleInformation
SetConsoleScreenBufferSize
CancelWaitableTimer
SetVolumeMountPointW
FindFirstFileExW
FreeEnvironmentStringsA
GetModuleHandleW
GetConsoleAliasesLengthA
GetSystemTimeAsFileTime
GetPrivateProfileStringW
ReadConsoleW
GetSystemWow64DirectoryA
QueryActCtxW
CreateActCtxW
GetSystemTimes
ActivateActCtx
GlobalAlloc
GlobalFindAtomA
LoadLibraryW
ReadConsoleInputA
SizeofResource
GetSystemWindowsDirectoryA
SetConsoleMode
HeapValidate
GetVolumePathNamesForVolumeNameW
GetModuleFileNameW
GetSystemDirectoryA
SetDllDirectoryW
GetStartupInfoW
VerifyVersionInfoW
GetLastError
IsDBCSLeadByteEx
SetLastError
GetProcAddress
CreateNamedPipeA
IsValidCodePage
CopyFileA
GlobalGetAtomNameA
SearchPathA
GetPrivateProfileStringA
OpenWaitableTimerA
WritePrivateProfileStringA
WTSGetActiveConsoleSessionId
SetConsoleCursorInfo
GetProcessShutdownParameters
BuildCommDCBA
GetCurrentDirectoryA
GetFileTime
GetVersionExA
GetWindowsDirectoryW
FileTimeToLocalFileTime
TlsFree
GetProfileSectionW
CommConfigDialogW
LocalFileTimeToFileTime
CompareStringW
TlsGetValue
DeleteFileA
GetCommandLineA
HeapSetInformation
EnterCriticalSection
LeaveCriticalSection
DecodePointer
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EncodePointer
IsProcessorFeaturePresent
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
InterlockedIncrement
ExitProcess
GetModuleFileNameA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
IsBadReadPtr
TlsAlloc
TlsSetValue
HeapCreate
WriteFile
GetACP
GetOEMCP
GetCPInfo
OutputDebugStringA
WriteConsoleW
OutputDebugStringW
RtlUnwind
RaiseException
SetFilePointer
GetConsoleCP
GetConsoleMode
HeapAlloc
HeapReAlloc
HeapSize
HeapQueryInformation
HeapFree
FlushFileBuffers
GetStringTypeW
LCMapStringW
MultiByteToWideChar
SetStdHandle
CloseHandle
CreateFileW
user32
GetMessageTime
gdi32
GetBitmapBits
Sections
.text Size: 225KB - Virtual size: 224KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 39.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 71KB - Virtual size: 70KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ