C:\jezezif\nete fakatamerip.pdb
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_53a0d8df737edd824241066638b4ecc859f285e2c74e391c7c7b9dc1e1c640ce.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
JaffaCakes118_53a0d8df737edd824241066638b4ecc859f285e2c74e391c7c7b9dc1e1c640ce.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_53a0d8df737edd824241066638b4ecc859f285e2c74e391c7c7b9dc1e1c640ce
-
Size
337KB
-
MD5
1e438cc75c27318882e50db6524f3553
-
SHA1
aa0ac3a45ca2fa037c81eedad6807eb480052cf7
-
SHA256
53a0d8df737edd824241066638b4ecc859f285e2c74e391c7c7b9dc1e1c640ce
-
SHA512
a43dc2e12593f61d69d33bf04bf9c91824fc7c98cad7d2c78bb7469139ad08232799eefa813999b2d06f32b18428801df0970d58ca8237115b5d66afbc690d9a
-
SSDEEP
6144:Ed44FG63LsU8ITQQgb4tZqlZ1YQldwxoKbLyY:iFG63LIrQguolZWQjZiLv
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource JaffaCakes118_53a0d8df737edd824241066638b4ecc859f285e2c74e391c7c7b9dc1e1c640ce
Files
-
JaffaCakes118_53a0d8df737edd824241066638b4ecc859f285e2c74e391c7c7b9dc1e1c640ce.exe windows:5 windows x86 arch:x86
807d42501d7f7832d883135d05fffe34
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
SetWaitableTimer
SetDllDirectoryW
InterlockedIncrement
_lwrite
SetFirmwareEnvironmentVariableA
GetSystemWindowsDirectoryW
GetNamedPipeHandleStateA
SetHandleInformation
GetComputerNameW
GetTickCount
GetProcessHeap
ConvertFiberToThread
ReadConsoleW
GetCompressedFileSizeW
GetSystemWow64DirectoryA
TlsSetValue
LoadLibraryW
GetConsoleMode
ReadConsoleInputA
CopyFileW
SetVolumeMountPointA
GetVersionExW
HeapCreate
HeapValidate
GetModuleFileNameW
CreateActCtxA
GetACP
GetStartupInfoW
VerifyVersionInfoW
FindFirstFileExA
GetLastError
IsDBCSLeadByteEx
SetLastError
GetLongPathNameA
GetConsoleAliasesLengthW
CopyFileA
FindClose
GetPrivateProfileStringA
ProcessIdToSessionId
LocalAlloc
IsWow64Process
WritePrivateProfileStringA
SetCurrentDirectoryW
GetVolumePathNamesForVolumeNameA
GetModuleFileNameA
SetConsoleCursorInfo
GetModuleHandleA
GetProcessShutdownParameters
CreateWaitableTimerW
FreeEnvironmentStringsW
WriteProfileStringW
BuildCommDCBA
VirtualProtect
CompareStringA
GetSystemRegistryQuota
TlsAlloc
FileTimeToLocalFileTime
CreateWaitableTimerA
GetSystemTime
CommConfigDialogW
CloseHandle
CreateFileW
SetStdHandle
GetConsoleCP
SetFilePointer
LCMapStringW
FlushFileBuffers
OutputDebugStringW
CreateNamedPipeA
WriteConsoleInputW
InterlockedDecrement
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
EncodePointer
DecodePointer
GetCommandLineA
HeapSetInformation
IsBadReadPtr
RaiseException
RtlUnwind
IsProcessorFeaturePresent
InitializeCriticalSectionAndSpinCount
SetUnhandledExceptionFilter
QueryPerformanceCounter
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
GetProcAddress
GetModuleHandleW
ExitProcess
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
TlsGetValue
TlsFree
WriteFile
HeapAlloc
HeapReAlloc
HeapSize
HeapQueryInformation
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
IsDebuggerPresent
HeapFree
GetOEMCP
GetCPInfo
IsValidCodePage
GetStringTypeW
MultiByteToWideChar
OutputDebugStringA
WriteConsoleW
user32
GetMenuItemID
GetCursorInfo
GetListBoxInfo
GetMenuInfo
GetComboBoxInfo
GetCaretBlinkTime
GetMessageTime
GetMenuBarInfo
gdi32
GetBitmapBits
Sections
.text Size: 172KB - Virtual size: 171KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 68KB - Virtual size: 31.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 21KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 75KB - Virtual size: 74KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ