C:\jazo\sirapetohus\jodaxovomusopo\1\rarumicepur87_lubipare.pdb
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_bda60b16925bf018562a18270e5ef72490a74284ebfd2ff90d0d55260b97b492.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
JaffaCakes118_bda60b16925bf018562a18270e5ef72490a74284ebfd2ff90d0d55260b97b492.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_bda60b16925bf018562a18270e5ef72490a74284ebfd2ff90d0d55260b97b492
-
Size
175KB
-
MD5
a3e8a4ea8c06001b1d17198c38505e74
-
SHA1
fc87f5b0f5bd9448ac169693cac4e89af11cdd4c
-
SHA256
bda60b16925bf018562a18270e5ef72490a74284ebfd2ff90d0d55260b97b492
-
SHA512
294c00df759e3631ab6607afac25c15ae70eabd8cd68dffe4c921f6af6f06cb668989688d13c256c8e33fe0ae437273c48309e95b7c8782fe06baf5be0bbc51b
-
SSDEEP
3072:nODfLSAVPUAMY9e2r6JGH71FXvTGGPCUWk0+WrxpzbgqruT9s9TbB:nODfLFUAMOcGXvzCF+uzbgwuT0B
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource JaffaCakes118_bda60b16925bf018562a18270e5ef72490a74284ebfd2ff90d0d55260b97b492
Files
-
JaffaCakes118_bda60b16925bf018562a18270e5ef72490a74284ebfd2ff90d0d55260b97b492.exe windows:5 windows x86 arch:x86
995d859dc5c5cdfbe9d72008a77e5890
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
ConvertThreadToFiber
ZombifyActCtx
SetDefaultCommConfigW
GetEnvironmentStringsW
WaitForSingleObject
WriteConsoleInputA
SetVolumeMountPointW
GetConsoleAliasesA
TerminateThread
GetLocaleInfoW
GetProcessHandleCount
GetVersionExW
GetConsoleAliasW
GetStringTypeA
WriteConsoleW
ReplaceFileW
FileTimeToSystemTime
GetConsoleAliasesW
GetLastError
GetProcAddress
VirtualAlloc
HeapSize
GetComputerNameExW
LoadLibraryA
LocalAlloc
GlobalAddAtomW
EnumCalendarInfoExA
GetWriteWatch
MultiByteToWideChar
UnhandledExceptionFilter
SetUnhandledExceptionFilter
HeapReAlloc
HeapAlloc
GetStartupInfoW
RaiseException
RtlUnwind
TerminateProcess
GetCurrentProcess
IsDebuggerPresent
HeapFree
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
GetModuleHandleW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
Sleep
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
HeapCreate
VirtualFree
GetModuleFileNameW
FreeEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
LCMapStringA
WideCharToMultiByte
LCMapStringW
GetStringTypeW
GetLocaleInfoA
InitializeCriticalSectionAndSpinCount
GetModuleHandleA
advapi32
AreAllAccessesGranted
Sections
.text Size: 104KB - Virtual size: 104KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 15KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 3.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.kif Size: 1024B - Virtual size: 626B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 47KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ