C:\giw-fut\ketatirovagubi\dahusap99\ronobehotatego fozud.pdb
Static task
static1
Behavioral task
behavioral1
Sample
80c8c74132ba4a5f2f905ac779f8dedf4688a2267288a8cb5fa544fe7c8b2830.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
80c8c74132ba4a5f2f905ac779f8dedf4688a2267288a8cb5fa544fe7c8b2830.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_c6f145f40bfd047eb2430ece58ae9ee5d8675ba7cdff685f6b487d9d2d056dd0
-
Size
127KB
-
MD5
8df42380699ecddaf2f29280299f967a
-
SHA1
d1f1a8efee1c50481740d7936d679d030a3c38a4
-
SHA256
c6f145f40bfd047eb2430ece58ae9ee5d8675ba7cdff685f6b487d9d2d056dd0
-
SHA512
2b810f468e2be96381da9cfd7a364de32ddf406a40fc011cf01feaaecccd528cbf7cdb8a8dab2037275eda3327be710e3ab091c356fdadaa3c88c303ac42e1aa
-
SSDEEP
3072:lXUMNgIod75MLi9iTB5CiN9E2a8ToTeTWxc:rNk75aJQaSc
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/80c8c74132ba4a5f2f905ac779f8dedf4688a2267288a8cb5fa544fe7c8b2830
Files
-
JaffaCakes118_c6f145f40bfd047eb2430ece58ae9ee5d8675ba7cdff685f6b487d9d2d056dd0.zip
-
80c8c74132ba4a5f2f905ac779f8dedf4688a2267288a8cb5fa544fe7c8b2830.exe windows:5 windows x86 arch:x86
16efb6b0368de80f5b2f8ee7ed5ecc80
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
FoldStringA
GetSystemTime
GetLocalTime
InterlockedDecrement
GetLocaleInfoW
InterlockedCompareExchange
_hwrite
SetWaitableTimer
GetSystemDirectoryA
CreateEventW
ReadConsoleA
VerifyVersionInfoA
BuildCommDCBA
GetConsoleAliasExesLengthA
SetSystemTimeAdjustment
PeekConsoleInputA
EnumDateFormatsA
CreateFileA
RegisterWaitForSingleObjectEx
LoadLibraryA
WaitNamedPipeA
GetEnvironmentStrings
FindResourceExA
VirtualFree
GetFirmwareEnvironmentVariableW
GetModuleFileNameW
BeginUpdateResourceW
EnumCalendarInfoExW
WriteConsoleOutputCharacterW
WriteConsoleA
LoadLibraryW
DeleteFileW
LocalAlloc
GetProcAddress
GetUserDefaultLCID
FindFirstChangeNotificationW
HeapUnlock
GetCalendarInfoW
SetConsoleTitleA
GetBinaryTypeW
GetComputerNameExA
FindNextFileA
OpenJobObjectA
HeapValidate
_lclose
GetComputerNameW
SetFileShortNameW
TlsSetValue
SetCalendarInfoW
SetComputerNameW
CreateDirectoryExA
DeleteCriticalSection
FindFirstChangeNotificationA
GetVolumePathNameW
GetProcessHandleCount
GetCurrentProcess
GetThreadLocale
GetSystemDefaultLangID
ReadFile
GetStringTypeW
HeapSize
GetDiskFreeSpaceA
RaiseException
RtlUnwind
MultiByteToWideChar
GetCommandLineW
HeapSetInformation
GetStartupInfoW
EncodePointer
HeapAlloc
GetLastError
HeapFree
IsProcessorFeaturePresent
SetFilePointer
EnterCriticalSection
LeaveCriticalSection
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
DecodePointer
TerminateProcess
TlsAlloc
TlsGetValue
TlsFree
InterlockedIncrement
GetModuleHandleW
SetLastError
GetCurrentThreadId
ExitProcess
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
CloseHandle
WriteFile
GetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
HeapCreate
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
SetStdHandle
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
FlushFileBuffers
Sleep
LCMapStringW
WriteConsoleW
HeapReAlloc
CreateFileW
user32
ClientToScreen
Sections
.text Size: 138KB - Virtual size: 138KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 32.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 30KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ