C:\yeref.pdb
Static task
static1
Behavioral task
behavioral1
Sample
09feed1234e29f79b739aa6863b7a62376b8c912ea19b6a340186e11b1388ec9.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
09feed1234e29f79b739aa6863b7a62376b8c912ea19b6a340186e11b1388ec9.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_f4f2bf4ddc04ff27514e0ebe8937fc896219f82b24bebb41c1965888986aa89b
-
Size
120KB
-
MD5
68a9bac9164486d0d4cb0a76d6e6e607
-
SHA1
824abd51ea52937e41e086f5737acbf9ad3ae180
-
SHA256
f4f2bf4ddc04ff27514e0ebe8937fc896219f82b24bebb41c1965888986aa89b
-
SHA512
e6177f570da32bf9e1bb83244e96babff19c9bf1536d51a3ef9a3d95c04c62947462bacdfff2b8e4a1858ce8ff5a47d1a794b9f3981e1504bf8469d78bd8d211
-
SSDEEP
3072:OoHDd4x5WifKjRDA1MvtslNsRfcIz3rRwYdOIi:Oqp4x5JCjFA1MyNsRfcI7VwYhi
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/09feed1234e29f79b739aa6863b7a62376b8c912ea19b6a340186e11b1388ec9
Files
-
JaffaCakes118_f4f2bf4ddc04ff27514e0ebe8937fc896219f82b24bebb41c1965888986aa89b.zip
-
09feed1234e29f79b739aa6863b7a62376b8c912ea19b6a340186e11b1388ec9.exe windows:5 windows x86 arch:x86
44ee62a4400af83b87d8ba40d9bab42b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
WriteConsoleInputW
SetComputerNameExA
GetStringTypeA
OpenJobObjectA
ReadConsoleA
GetConsoleAliasA
InterlockedDecrement
GetProfileSectionA
EnumCalendarInfoExW
GetConsoleAliasesA
GetConsoleAliasesLengthA
CreateRemoteThread
SetFileTime
FindResourceExA
TerminateThread
GetLocaleInfoW
GetFileAttributesA
GetAtomNameW
GetModuleFileNameW
ReleaseSemaphore
GetLastError
GetProcAddress
GetLongPathNameA
VirtualAlloc
WriteConsoleA
LocalAlloc
DnsHostnameToComputerNameA
GetFileType
HeapLock
GetModuleFileNameA
GetDefaultCommConfigA
SetConsoleTitleW
GetModuleHandleA
GetConsoleTitleW
GetVersionExA
ReadConsoleInputW
ResetWriteWatch
CreateThread
CreateMailslotW
FileTimeToDosDateTime
HeapAlloc
GetCommandLineA
GetStartupInfoA
RaiseException
RtlUnwind
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapFree
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
VirtualFree
HeapReAlloc
HeapCreate
GetModuleHandleW
Sleep
ExitProcess
WriteFile
GetStdHandle
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
SetHandleCount
SetFilePointer
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetConsoleCP
GetConsoleMode
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
InitializeCriticalSectionAndSpinCount
LoadLibraryA
CloseHandle
CreateFileA
SetStdHandle
FlushFileBuffers
HeapSize
GetConsoleOutputCP
WriteConsoleW
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeW
GetLocaleInfoA
SetEndOfFile
GetProcessHeap
ReadFile
user32
SetCaretPos
advapi32
AdjustTokenGroups
Sections
.text Size: 70KB - Virtual size: 69KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 136KB - Virtual size: 160KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 57KB - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ