C:\wanacif_dom\87\gurutiwo6_xayifuru.pdb
Static task
static1
Behavioral task
behavioral1
Sample
a218d406d0fa9f6a7dd2fbd924d1fd318851c7f7257771d21965ab0d0de65543.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a218d406d0fa9f6a7dd2fbd924d1fd318851c7f7257771d21965ab0d0de65543.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_151cd59f8436587bec1f40785d6148d7d3e32807a451ff258001dbe7682c215c
-
Size
119KB
-
MD5
164cde8761226174ac41c0fadb880778
-
SHA1
e48ab9c8f22f6aab3ed57a90f32cec37effdb0bf
-
SHA256
151cd59f8436587bec1f40785d6148d7d3e32807a451ff258001dbe7682c215c
-
SHA512
00a4d5c3c8bf6ada7273f2b889a6036ff3ce44b12c2d90f4cd4aa93b73e247de8385d57139ad22b6b62c7aab14046bcd8d0d4f385268a63672d4f58861c1b683
-
SSDEEP
3072:tN5Om4FVOT5C7Ot8u9GAScXcGDjzhMdpM+eB:t/F4+FhtZScXcGThgU
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/a218d406d0fa9f6a7dd2fbd924d1fd318851c7f7257771d21965ab0d0de65543
Files
-
JaffaCakes118_151cd59f8436587bec1f40785d6148d7d3e32807a451ff258001dbe7682c215c.zip
-
a218d406d0fa9f6a7dd2fbd924d1fd318851c7f7257771d21965ab0d0de65543.exe windows:5 windows x86 arch:x86
44ee62a4400af83b87d8ba40d9bab42b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
WriteConsoleInputW
SetComputerNameExA
GetStringTypeA
OpenJobObjectA
ReadConsoleA
GetConsoleAliasA
InterlockedDecrement
GetProfileSectionA
EnumCalendarInfoExW
GetConsoleAliasesA
GetConsoleAliasesLengthA
CreateRemoteThread
SetFileTime
FindResourceExA
TerminateThread
GetLocaleInfoW
GetFileAttributesA
GetAtomNameW
GetModuleFileNameW
ReleaseSemaphore
GetLastError
GetProcAddress
GetLongPathNameA
VirtualAlloc
WriteConsoleA
LocalAlloc
DnsHostnameToComputerNameA
GetFileType
HeapLock
GetModuleFileNameA
GetDefaultCommConfigA
SetConsoleTitleW
GetModuleHandleA
GetConsoleTitleW
GetVersionExA
ReadConsoleInputW
ResetWriteWatch
CreateThread
CreateMailslotW
FileTimeToDosDateTime
HeapAlloc
GetCommandLineA
GetStartupInfoA
RaiseException
RtlUnwind
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapFree
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
VirtualFree
HeapReAlloc
HeapCreate
GetModuleHandleW
Sleep
ExitProcess
WriteFile
GetStdHandle
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
SetHandleCount
SetFilePointer
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetConsoleCP
GetConsoleMode
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
InitializeCriticalSectionAndSpinCount
LoadLibraryA
CloseHandle
CreateFileA
SetStdHandle
FlushFileBuffers
HeapSize
GetConsoleOutputCP
WriteConsoleW
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeW
GetLocaleInfoA
SetEndOfFile
GetProcessHeap
ReadFile
user32
SetCaretPos
advapi32
AdjustTokenGroups
Sections
.text Size: 70KB - Virtual size: 69KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 135KB - Virtual size: 159KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 57KB - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ