C:\puxoyadet\zucadun\leyahiwuriduk72\mikilutipiv\ceg100.pdb
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_bf1529d684825accdb60acd5f6f8fbe6bc819a705dcda07dd4f565fffdd46b79.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_bf1529d684825accdb60acd5f6f8fbe6bc819a705dcda07dd4f565fffdd46b79.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_bf1529d684825accdb60acd5f6f8fbe6bc819a705dcda07dd4f565fffdd46b79
-
Size
332KB
-
MD5
5cae962bf42ceb89add6497fb5fa455e
-
SHA1
bb28f06eeac89f3a38f9d5271c9cc121e94405ec
-
SHA256
bf1529d684825accdb60acd5f6f8fbe6bc819a705dcda07dd4f565fffdd46b79
-
SHA512
5a5e617152397ee13bae1d08983b9fdb4a0225369fea720ad01d9be5f5fcb8062103f65bdc1175b8db0a5f387b20470ea099fc8d0c3d5f37866c8606c57ff0cc
-
SSDEEP
6144:Hq80kju85cYfPli8mrak7BKQVKnaQ5ewuqHxxgNu:Hh0AugcsPli8mrak9KQgnaQju8x
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource JaffaCakes118_bf1529d684825accdb60acd5f6f8fbe6bc819a705dcda07dd4f565fffdd46b79
Files
-
JaffaCakes118_bf1529d684825accdb60acd5f6f8fbe6bc819a705dcda07dd4f565fffdd46b79.exe windows:5 windows x86 arch:x86
f8a1a153568c8d0114bbef3bf9e0fd81
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
TerminateProcess
GetExitCodeProcess
GetVersionExA
VerifyVersionInfoA
CopyFileExA
GetConsoleMode
GetConsoleCP
VerLanguageNameA
GetDriveTypeW
FindFirstChangeNotificationW
FreeEnvironmentStringsW
RequestWakeupLatency
SetVolumeMountPointA
GetLongPathNameA
CopyFileW
TlsGetValue
GetConsoleCursorInfo
LocalHandle
SystemTimeToTzSpecificLocalTime
GetProcessShutdownParameters
MultiByteToWideChar
LocalUnlock
GetNamedPipeHandleStateW
BuildCommDCBAndTimeoutsW
GetProcAddress
GetModuleHandleA
GlobalAlloc
Sleep
MoveFileA
GetCommandLineW
InterlockedDecrement
DeleteFileW
GetVolumePathNamesForVolumeNameA
GetPrivateProfileStringA
GetPrivateProfileIntA
HeapSize
GetProcessHeaps
CreateNamedPipeA
GetEnvironmentVariableA
GetCPInfoExA
GetSystemWindowsDirectoryA
GetSystemWow64DirectoryA
GetLastError
WriteProfileSectionW
GetCalendarInfoA
SetLastError
GetExitCodeThread
WaitForDebugEvent
ReadFileScatter
ReadFile
SetDefaultCommConfigA
GetNumberOfConsoleMouseButtons
GlobalWire
WritePrivateProfileSectionW
WriteProfileStringA
lstrcatW
FindCloseChangeNotification
CreateActCtxA
InterlockedPopEntrySList
OutputDebugStringW
InterlockedExchange
SetConsoleTitleW
DefineDosDeviceW
LoadLibraryW
WritePrivateProfileStringW
WaitNamedPipeW
InterlockedIncrement
SetConsoleMode
PeekConsoleInputA
GetNumberFormatA
CreateSemaphoreW
LoadModule
FindFirstVolumeW
GetPrivateProfileSectionNamesW
EnumTimeFormatsA
SetLocalTime
CreateSemaphoreA
FindNextFileA
FindFirstFileW
FreeEnvironmentStringsA
OutputDebugStringA
lstrcpyW
HeapSetInformation
CreateHardLinkW
RaiseException
GetSystemTime
UnlockFile
EnumCalendarInfoExA
MoveFileExA
SetConsoleScreenBufferSize
SearchPathW
IsBadStringPtrW
GetAtomNameW
GetConsoleAliasExesLengthA
WriteConsoleInputA
LocalLock
SetCommState
EnumSystemLocalesA
GetNumaHighestNodeNumber
SetEndOfFile
GetWriteWatch
SetUnhandledExceptionFilter
OpenSemaphoreA
GetLargestConsoleWindowSize
GetProfileStringA
ZombifyActCtx
GetVolumePathNamesForVolumeNameW
EnumDateFormatsW
SetSystemTimeAdjustment
OpenMutexW
GetComputerNameA
HeapCompact
CommConfigDialogA
OpenMutexA
GetStringTypeA
SetSystemPowerState
FindResourceA
DeleteTimerQueueTimer
EnumResourceNamesW
CreateTimerQueueTimer
GetProcessTimes
UnregisterWait
IsBadReadPtr
GetCurrentProcessId
FatalAppExitW
GetFileAttributesW
lstrcpynW
DisconnectNamedPipe
WriteConsoleOutputAttribute
GetCompressedFileSizeA
SetFileShortNameA
GetFullPathNameA
WriteProfileStringW
SetInformationJobObject
GlobalAddAtomA
EnumDateFormatsA
TerminateJobObject
QueryDosDeviceW
LeaveCriticalSection
GetBinaryTypeW
SetCurrentDirectoryA
CloseHandle
GetFullPathNameW
OpenFileMappingA
EncodePointer
DecodePointer
GetStartupInfoW
IsProcessorFeaturePresent
TlsAlloc
TlsSetValue
GetCurrentThreadId
TlsFree
GetModuleHandleW
ExitProcess
HeapValidate
EnterCriticalSection
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
GetCurrentProcess
UnhandledExceptionFilter
IsDebuggerPresent
GetModuleFileNameW
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
GetEnvironmentStringsW
HeapCreate
WriteFile
GetACP
GetOEMCP
GetCPInfo
IsValidCodePage
RtlUnwind
HeapAlloc
GetModuleFileNameA
HeapReAlloc
HeapQueryInformation
HeapFree
SetFilePointer
WideCharToMultiByte
WriteConsoleW
LCMapStringW
GetStringTypeW
FlushFileBuffers
SetStdHandle
CreateFileW
user32
GetMenuItemID
GetCursorInfo
gdi32
GetBitmapBits
Sections
.text Size: 231KB - Virtual size: 230KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 55KB - Virtual size: 562KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 30KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ