C:\yuduyaxeh-tufaku\ce.pdb
Static task
static1
Behavioral task
behavioral1
Sample
7327a0f712215331725901c0383927b50edc3cf9fbcdca70700fb613c59990b2.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
7327a0f712215331725901c0383927b50edc3cf9fbcdca70700fb613c59990b2.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_de911ac34eaf245b021db66b7ccf13af0f1f83de17caa33829adcbd7eeb7fc45
-
Size
670KB
-
MD5
f067a1e253672b8fae2ddc0bd5cfee45
-
SHA1
86f7a997c180cdb15c8af609fc4f03731ee7cdd2
-
SHA256
de911ac34eaf245b021db66b7ccf13af0f1f83de17caa33829adcbd7eeb7fc45
-
SHA512
5003cf93e1adba9ca83d53347a1d94a05cbc3681e0ad3a0c2ddae6ca130f484bd57090da97d4d03d271ba243321446648993d3fb7a847b6acbfaa603badc4b37
-
SSDEEP
12288:ydNS0ed+3AbDW1Z9QoDQZHpjtABiPNVvLv0emEEqohKwmG/hrH/++TH:ydNNt3AnW9QoUZJjyBiPN5sxdqCKpG/b
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/7327a0f712215331725901c0383927b50edc3cf9fbcdca70700fb613c59990b2
Files
-
JaffaCakes118_de911ac34eaf245b021db66b7ccf13af0f1f83de17caa33829adcbd7eeb7fc45.zip
-
7327a0f712215331725901c0383927b50edc3cf9fbcdca70700fb613c59990b2.exe windows:5 windows x86 arch:x86
ce92d88910dad9eeb68593f866ac6902
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
VerSetConditionMask
SetLocaleInfoW
FindNextVolumeA
HeapWalk
GetNamedPipeHandleStateW
FileTimeToLocalFileTime
FillConsoleOutputCharacterW
VirtualFree
TerminateProcess
GetLastError
GetVersionExA
FreeResource
EnumResourceNamesW
FindNextFileA
CopyFileExW
BuildCommDCBW
SetDefaultCommConfigA
WritePrivateProfileStructA
LocalCompact
ChangeTimerQueueTimer
ReadConsoleInputA
WriteConsoleInputA
LoadResource
AddAtomA
SearchPathA
GetThreadTimes
CallNamedPipeW
GetDriveTypeA
BuildCommDCBAndTimeoutsW
VirtualProtect
LoadLibraryA
GlobalAlloc
SetProcessPriorityBoost
GetProfileSectionW
DeleteFileW
FindFirstChangeNotificationA
VerifyVersionInfoA
FormatMessageW
SetDllDirectoryW
GetModuleHandleW
WritePrivateProfileStringA
GetUserDefaultLCID
SetWaitableTimer
SetConsoleTextAttribute
InterlockedDecrement
GetStartupInfoW
GetSystemWow64DirectoryA
CopyFileA
SetCalendarInfoA
DebugBreak
EndUpdateResourceW
SetLastError
FatalAppExitW
SetSystemTime
OpenFileMappingA
GetConsoleAliasExesLengthA
lstrcmpA
WriteFileGather
FlushConsoleInputBuffer
SetDefaultCommConfigW
VirtualAllocEx
InterlockedExchangeAdd
GetSystemTimeAdjustment
GetSystemWindowsDirectoryW
GetACP
GlobalFindAtomW
lstrcatA
SetMailslotInfo
CreateActCtxW
_lwrite
OutputDebugStringA
CreateNamedPipeA
GetAtomNameW
SetConsoleActiveScreenBuffer
EnumResourceTypesW
lstrlenA
DebugActiveProcessStop
WriteConsoleW
lstrcpyA
GetModuleHandleA
ReadConsoleOutputW
GetThreadContext
ReleaseActCtx
GetStringTypeA
GetPrivateProfileStringA
GetDriveTypeW
GetFileAttributesExA
LocalFileTimeToFileTime
MoveFileA
GetVolumePathNameA
GetCommMask
SetFileShortNameW
VerLanguageNameW
LockFile
ProcessIdToSessionId
GetQueuedCompletionStatus
AllocConsole
GlobalGetAtomNameA
SetComputerNameA
GetConsoleAliasExesLengthW
WriteConsoleInputW
CreateMailslotW
SystemTimeToTzSpecificLocalTime
MoveFileWithProgressA
ContinueDebugEvent
GetStringTypeExA
EnumSystemLocalesA
GetPrivateProfileIntA
OpenMutexW
GetModuleFileNameW
OpenWaitableTimerA
GetConsoleAliasesLengthW
GlobalUnWire
FillConsoleOutputCharacterA
GetCompressedFileSizeA
FindNextVolumeMountPointA
SetThreadPriority
ReadConsoleW
MapUserPhysicalPagesScatter
WriteConsoleOutputCharacterW
QueryInformationJobObject
GetDateFormatW
GetConsoleAliasExesW
EnumDateFormatsA
GlobalUnfix
OpenMutexA
RaiseException
GetCommandLineA
GetStartupInfoA
HeapValidate
IsBadReadPtr
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
InterlockedIncrement
GetOEMCP
GetCPInfo
IsValidCodePage
GetProcAddress
TlsGetValue
TlsAlloc
TlsSetValue
GetCurrentThreadId
TlsFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
Sleep
ExitProcess
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
HeapDestroy
HeapCreate
HeapFree
WriteFile
HeapAlloc
HeapSize
HeapReAlloc
VirtualAlloc
RtlUnwind
InitializeCriticalSectionAndSpinCount
OutputDebugStringW
LoadLibraryW
MultiByteToWideChar
GetStringTypeW
LCMapStringA
LCMapStringW
GetLocaleInfoA
SetFilePointer
GetConsoleCP
GetConsoleMode
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
CreateFileA
CloseHandle
FlushFileBuffers
advapi32
InitiateSystemShutdownA
Sections
.text Size: 170KB - Virtual size: 169KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 589KB - Virtual size: 743KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ