C:\gecisuzom\vizudeneyenu poleyehom-divacag\rowul.pdb
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_e3692685f9a728e0daeea23f159484fd1009bf615126d51a29440dcf53ab0d42.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_e3692685f9a728e0daeea23f159484fd1009bf615126d51a29440dcf53ab0d42.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_e3692685f9a728e0daeea23f159484fd1009bf615126d51a29440dcf53ab0d42
-
Size
184KB
-
MD5
31fc0122636001e76cca65cd85d28a7f
-
SHA1
9e42a8fb0214134f7312068cbfa4a1f663b629c2
-
SHA256
e3692685f9a728e0daeea23f159484fd1009bf615126d51a29440dcf53ab0d42
-
SHA512
5e0527691f54fc26e683fcf692d637678bc57aece088502ce24d2f3430eb908c50f36c99f8f423eaadbbd574ee1a4b6e7e157ebe346160adba6c2237094e9314
-
SSDEEP
3072:nkmEokfyW/Sshyd6OCbefqGKIti4KrTWssUPZPwTns9MUjYAYeL9hgC:n8okaW/SshhQijKiZrT3jPCUjmev
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource JaffaCakes118_e3692685f9a728e0daeea23f159484fd1009bf615126d51a29440dcf53ab0d42
Files
-
JaffaCakes118_e3692685f9a728e0daeea23f159484fd1009bf615126d51a29440dcf53ab0d42.exe windows:5 windows x86 arch:x86
b81208afe657df957690a75b8ae29877
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
lstrlenA
HeapAlloc
EndUpdateResourceW
GetQueuedCompletionStatus
ReadConsoleA
GetCurrentProcess
SetEvent
BackupSeek
WriteFile
GetEnvironmentStrings
InitAtomTable
HeapDestroy
GetFileAttributesA
FindNextVolumeW
IsProcessorFeaturePresent
GetTapePosition
WriteConsoleW
GetModuleFileNameW
ReleaseSemaphore
DeactivateActCtx
InterlockedExchange
GetProcAddress
BeginUpdateResourceW
GetProcessVersion
LocalAlloc
RemoveDirectoryW
SetConsoleWindowInfo
GetModuleHandleA
GetConsoleTitleW
VirtualProtect
SetProcessShutdownParameters
GetCurrentProcessId
FindNextVolumeA
lstrcpyA
CreateFileW
HeapSize
GetCommandLineW
HeapSetInformation
GetStartupInfoW
DecodePointer
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EncodePointer
TerminateProcess
GetLastError
HeapFree
SetFilePointer
EnterCriticalSection
LeaveCriticalSection
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleW
SetLastError
GetCurrentThreadId
CloseHandle
ExitProcess
GetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
HeapCreate
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
Sleep
SetStdHandle
FlushFileBuffers
RtlUnwind
LCMapStringW
MultiByteToWideChar
GetStringTypeW
LoadLibraryW
HeapReAlloc
RaiseException
Exports
Exports
@GetFirstVice@8
@SetViceVariants@12
Sections
.text Size: 99KB - Virtual size: 98KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 84KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bukip Size: 1024B - Virtual size: 624B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.demuniv Size: 512B - Virtual size: 23B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 58KB - Virtual size: 57KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ