C:\xabaf\zulehotabeyo-taleni\likifodoraja-warokug.pdb
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_0ad8dc80eef06a5cedcbcec0871e8aa976fd870b814fc80c1534c6e9fd378b95.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_0ad8dc80eef06a5cedcbcec0871e8aa976fd870b814fc80c1534c6e9fd378b95.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_0ad8dc80eef06a5cedcbcec0871e8aa976fd870b814fc80c1534c6e9fd378b95
-
Size
319KB
-
MD5
3fec5b2cd8ad9cf5e402e5917d0a2d28
-
SHA1
e7bb71e2a451c80dea5d8817ce2baf57d431d967
-
SHA256
0ad8dc80eef06a5cedcbcec0871e8aa976fd870b814fc80c1534c6e9fd378b95
-
SHA512
6983581c36a46842292a90ab6499beb484d6c0933ca0f87f68bc3859a2f47b6210bbbf69365eafbf2cc74430fa656957aeb977838b5461a2376c53df7f564cb9
-
SSDEEP
6144:DMh8SvMvFv8Ibbn71octhHlOZU5PtV7WexP2:wh8SvMRbLpocthHlF5Pj7z2
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource JaffaCakes118_0ad8dc80eef06a5cedcbcec0871e8aa976fd870b814fc80c1534c6e9fd378b95
Files
-
JaffaCakes118_0ad8dc80eef06a5cedcbcec0871e8aa976fd870b814fc80c1534c6e9fd378b95.exe windows:5 windows x86 arch:x86
5bf1109d17f31fdf1287dd3cc8a8bd45
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
_lwrite
InterlockedDecrement
SetFirmwareEnvironmentVariableA
GetNamedPipeHandleStateA
SetHandleInformation
SetConsoleScreenBufferSize
CancelWaitableTimer
SetVolumeMountPointW
FindFirstFileExW
FreeEnvironmentStringsA
GetModuleHandleW
GetConsoleAliasesLengthA
GetSystemTimeAsFileTime
GetPrivateProfileStringW
ReadConsoleW
GetSystemWow64DirectoryA
QueryActCtxW
CreateActCtxW
GetSystemTimes
ActivateActCtx
GlobalAlloc
GlobalFindAtomA
LoadLibraryW
ReadConsoleInputA
SizeofResource
GetSystemWindowsDirectoryA
SetConsoleMode
HeapValidate
GetVolumePathNamesForVolumeNameW
GetModuleFileNameW
GetSystemDirectoryA
SetDllDirectoryW
GetStartupInfoW
VerifyVersionInfoW
GetLastError
IsDBCSLeadByteEx
SetLastError
GetProcAddress
CreateNamedPipeA
IsValidCodePage
CopyFileA
GlobalGetAtomNameA
SearchPathA
GetPrivateProfileStringA
OpenWaitableTimerA
WritePrivateProfileStringA
WTSGetActiveConsoleSessionId
SetConsoleCursorInfo
GetProcessShutdownParameters
BuildCommDCBA
GetCurrentDirectoryA
GetFileTime
GetVersionExA
GetWindowsDirectoryW
FileTimeToLocalFileTime
TlsFree
GetProfileSectionW
CommConfigDialogW
LocalFileTimeToFileTime
CompareStringW
TlsGetValue
DeleteFileA
GetCommandLineA
HeapSetInformation
EnterCriticalSection
LeaveCriticalSection
DecodePointer
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EncodePointer
IsProcessorFeaturePresent
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
InterlockedIncrement
ExitProcess
GetModuleFileNameA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
IsBadReadPtr
TlsAlloc
TlsSetValue
HeapCreate
WriteFile
GetACP
GetOEMCP
GetCPInfo
OutputDebugStringA
WriteConsoleW
OutputDebugStringW
RtlUnwind
RaiseException
SetFilePointer
GetConsoleCP
GetConsoleMode
HeapAlloc
HeapReAlloc
HeapSize
HeapQueryInformation
HeapFree
FlushFileBuffers
GetStringTypeW
LCMapStringW
MultiByteToWideChar
SetStdHandle
CloseHandle
CreateFileW
user32
GetMessageTime
gdi32
GetBitmapBits
Sections
.text Size: 225KB - Virtual size: 224KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 39.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 71KB - Virtual size: 70KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ