C:\huh-wokuso rekara\zutayuc\wiboh\nihidiwi.pdb
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_04c777c9d1768f49575b7f3d09b646f15670a90c7d7fc9c2b56d3d69335900c1.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_04c777c9d1768f49575b7f3d09b646f15670a90c7d7fc9c2b56d3d69335900c1.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_04c777c9d1768f49575b7f3d09b646f15670a90c7d7fc9c2b56d3d69335900c1
-
Size
312KB
-
MD5
95f3cb490c68035100e26fe46de61f67
-
SHA1
6dd5ea5707b9ae1a0254363fcf0431855d61a7dc
-
SHA256
04c777c9d1768f49575b7f3d09b646f15670a90c7d7fc9c2b56d3d69335900c1
-
SHA512
bf8d65a5bb18b6e22696a450c7b5f6f0e2ca4f83432b43525d94f1f76f90b77892f2b18358fa41771fd163d6143d5726dbad4f3490a71357cfc8a19fea1074bf
-
SSDEEP
6144:8967UZXXeVkFddGOemi5pcqbsdQt4RFvkw:8QwZXrFqTN5pcqiQt4fl
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource JaffaCakes118_04c777c9d1768f49575b7f3d09b646f15670a90c7d7fc9c2b56d3d69335900c1
Files
-
JaffaCakes118_04c777c9d1768f49575b7f3d09b646f15670a90c7d7fc9c2b56d3d69335900c1.exe windows:5 windows x86 arch:x86
3408fba80e29181a109d56e09bca7888
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
CallNamedPipeA
TerminateProcess
GetExitCodeProcess
GetVersionExW
SetConsoleCP
GetConsoleAliasesLengthW
GetDefaultCommConfigW
FindFirstFileExW
GetDriveTypeW
FreeEnvironmentStringsA
SetProcessPriorityBoost
SetVolumeMountPointW
GetLongPathNameA
CopyFileA
TlsGetValue
SetConsoleCursorInfo
SetComputerNameExA
TzSpecificLocalTimeToSystemTime
FindAtomA
ReleaseSemaphore
GetNamedPipeHandleStateA
CreateMailslotW
BuildCommDCBAndTimeoutsW
VirtualProtect
LoadLibraryA
LocalAlloc
TryEnterCriticalSection
TlsSetValue
GetCommandLineW
InterlockedDecrement
GetCalendarInfoA
DeleteFileW
CreateActCtxW
CreateRemoteThread
SetSystemTimeAdjustment
GetPriorityClass
WritePrivateProfileStringA
GetProcessHeaps
GetProcessHeap
GlobalWire
ReadConsoleOutputCharacterW
GetStartupInfoA
GetDiskFreeSpaceExA
GetCPInfoExW
GetWindowsDirectoryA
GetSystemWow64DirectoryW
GetLastError
WriteProfileSectionW
GetProfileStringA
SetLastError
DeleteVolumeMountPointA
DebugBreak
lstrcmpA
WriteFile
GetVersion
GetSystemWindowsDirectoryW
GetThreadSelectorEntry
FindCloseChangeNotification
GetTapeParameters
SetMailslotInfo
InterlockedExchange
DefineDosDeviceW
FindVolumeMountPointClose
EndUpdateResourceW
WriteConsoleW
GetSystemTimeAdjustment
WritePrivateProfileSectionA
GetPrivateProfileStructW
GetDriveTypeA
GetFileAttributesExA
MoveFileW
GetVolumePathNameW
HeapUnlock
lstrcmpW
SetDefaultCommConfigW
FindActCtxSectionStringA
ResetEvent
GetThreadContext
MoveFileExW
GetProcAddress
GlobalLock
UnregisterWaitEx
BuildCommDCBA
PeekConsoleInputA
GetBinaryTypeW
CreateSemaphoreW
TransmitCommChar
WaitNamedPipeA
GetPrivateProfileSectionNamesW
FindResourceExW
EnumTimeFormatsW
GetLocalTime
CreateSemaphoreA
GetPrivateProfileSectionW
GetConsoleMode
GetOverlappedResult
GetThreadLocale
SetFileShortNameW
lstrcpyA
VerLanguageNameW
SetThreadExecutionState
SetSystemTime
LockFile
VerSetConditionMask
GetConsoleAliasA
FlushConsoleInputBuffer
FreeConsole
GetAtomNameW
GetConsoleAliasExesLengthA
WriteConsoleInputW
TransactNamedPipe
EnumDateFormatsA
SetCommState
FileTimeToLocalFileTime
_lopen
GetConsoleAliasExesLengthW
GetWriteWatch
FreeEnvironmentStringsW
GetNumberOfConsoleInputEvents
GetModuleHandleW
WriteConsoleOutputCharacterA
HeapFree
OpenMutexW
LocalLock
GetCommMask
SetMessageWaitingIndicator
FindClose
CreateIoCompletionPort
SetFileApisToANSI
CancelWaitableTimer
GetProcessHandleCount
UnregisterWait
GetProcessVersion
lstrcpynA
GetNamedPipeInfo
GetCompressedFileSizeW
FindNextVolumeMountPointW
GetFullPathNameA
WriteProfileStringW
DeleteAtom
GlobalAddAtomW
TerminateJobObject
QueryDosDeviceW
InitializeCriticalSection
Process32NextW
SetCurrentDirectoryW
GetBinaryTypeA
MoveFileA
RaiseException
GetStartupInfoW
HeapValidate
IsBadReadPtr
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetModuleFileNameW
GetModuleHandleA
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
InterlockedIncrement
GetACP
GetOEMCP
GetCPInfo
IsValidCodePage
TlsAlloc
GetCurrentThreadId
TlsFree
Sleep
ExitProcess
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
HeapDestroy
HeapCreate
VirtualFree
GetModuleFileNameA
HeapAlloc
HeapSize
HeapReAlloc
VirtualAlloc
RtlUnwind
InitializeCriticalSectionAndSpinCount
OutputDebugStringA
OutputDebugStringW
LoadLibraryW
MultiByteToWideChar
GetStringTypeA
GetStringTypeW
WideCharToMultiByte
LCMapStringA
LCMapStringW
GetLocaleInfoA
SetFilePointer
GetConsoleCP
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
CreateFileA
CloseHandle
FlushFileBuffers
Sections
.text Size: 252KB - Virtual size: 252KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 1.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.sinisu Size: 512B - Virtual size: 5B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.zeroka Size: 512B - Virtual size: 234B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.yexo Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 31KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ