C:\kavizexiba.pdb
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_c11381c26c551893386bb1319dbd231e056120d76a9f19b31b2bdaafdd42889d.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_c11381c26c551893386bb1319dbd231e056120d76a9f19b31b2bdaafdd42889d.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_c11381c26c551893386bb1319dbd231e056120d76a9f19b31b2bdaafdd42889d
-
Size
184KB
-
MD5
4bf56f09203f49ce62a8bde95370b5e8
-
SHA1
8c961cec6688e7ec733f21f85913aa72a6581759
-
SHA256
c11381c26c551893386bb1319dbd231e056120d76a9f19b31b2bdaafdd42889d
-
SHA512
d4ae50a9c80f8ccf334d3e4486d79242a38ad52dbc116d89e98f792f26a9f674b99b41116f9028171b6c9d6fbf138940b07c705db7137a2c3b7094b231aff396
-
SSDEEP
3072:mXmEokfyWlUit95FAOslzEk7sQMXhIbRPsCPZPw3ZWrIUphgC:mbokaWn9oVJESpMhIb5lPS4
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource JaffaCakes118_c11381c26c551893386bb1319dbd231e056120d76a9f19b31b2bdaafdd42889d
Files
-
JaffaCakes118_c11381c26c551893386bb1319dbd231e056120d76a9f19b31b2bdaafdd42889d.exe windows:5 windows x86 arch:x86
b81208afe657df957690a75b8ae29877
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
lstrlenA
HeapAlloc
EndUpdateResourceW
GetQueuedCompletionStatus
ReadConsoleA
GetCurrentProcess
SetEvent
BackupSeek
WriteFile
GetEnvironmentStrings
InitAtomTable
HeapDestroy
GetFileAttributesA
FindNextVolumeW
IsProcessorFeaturePresent
GetTapePosition
WriteConsoleW
GetModuleFileNameW
ReleaseSemaphore
DeactivateActCtx
InterlockedExchange
GetProcAddress
BeginUpdateResourceW
GetProcessVersion
LocalAlloc
RemoveDirectoryW
SetConsoleWindowInfo
GetModuleHandleA
GetConsoleTitleW
VirtualProtect
SetProcessShutdownParameters
GetCurrentProcessId
FindNextVolumeA
lstrcpyA
CreateFileW
HeapSize
GetCommandLineW
HeapSetInformation
GetStartupInfoW
DecodePointer
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EncodePointer
TerminateProcess
GetLastError
HeapFree
SetFilePointer
EnterCriticalSection
LeaveCriticalSection
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleW
SetLastError
GetCurrentThreadId
CloseHandle
ExitProcess
GetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
HeapCreate
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
Sleep
SetStdHandle
FlushFileBuffers
RtlUnwind
LCMapStringW
MultiByteToWideChar
GetStringTypeW
LoadLibraryW
HeapReAlloc
RaiseException
Exports
Exports
@GetFirstVice@8
@SetViceVariants@12
Sections
.text Size: 99KB - Virtual size: 99KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 84KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.litoju Size: 1024B - Virtual size: 624B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.deve Size: 512B - Virtual size: 23B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 58KB - Virtual size: 57KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ