C:\pumuzociriku_zowukovup\88-c.pdb
Static task
static1
Behavioral task
behavioral1
Sample
3db9a9633bb3097ee7f34cd85bbc168ed3a59496c0c407cf1d22087d58fa2763.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3db9a9633bb3097ee7f34cd85bbc168ed3a59496c0c407cf1d22087d58fa2763.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_8c65c06a996ac6862230624679911918f188155112aadc288b8453f4f629c6ff
-
Size
171KB
-
MD5
9af3daed34da9dc3e52e2077c3555254
-
SHA1
ab8398f41b46c49cedf0b24105e12cfaec72e4b1
-
SHA256
8c65c06a996ac6862230624679911918f188155112aadc288b8453f4f629c6ff
-
SHA512
29fd5e1f415cfa6fbc1a812b91fd1831f8c7bb6de44fe5916b06822a8c756a382a5b0ee8cfd4a2140d5e1b3b32e3c8ca8109d7ea236018bbbcea240c7ad3784d
-
SSDEEP
3072:Ax5OhBrEymQOe0dGeqnJxwyBKXQryg/4n0nQwHPNEGo7LUXwKR3+EPJ1o7t:AcN9LO7GoyBcFI4yVEvoAU3lPzoJ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/3db9a9633bb3097ee7f34cd85bbc168ed3a59496c0c407cf1d22087d58fa2763
Files
-
JaffaCakes118_8c65c06a996ac6862230624679911918f188155112aadc288b8453f4f629c6ff.zip
-
3db9a9633bb3097ee7f34cd85bbc168ed3a59496c0c407cf1d22087d58fa2763.exe windows:5 windows x86 arch:x86
32f2c538eab8007c123c6eaeceead9e9
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
LoadLibraryA
GetComputerNameExA
WriteProfileSectionA
GetNumaProcessorNode
FindFirstVolumeA
SetConsoleCursorInfo
HeapUnlock
FindFirstChangeNotificationA
WaitForSingleObject
GetNamedPipeHandleStateW
FileTimeToDosDateTime
EnumResourceTypesW
EnumResourceNamesW
ExitProcess
TerminateProcess
ActivateActCtx
GetVersionExA
VerifyVersionInfoW
SetConsoleOutputCP
ResetEvent
FindNextFileW
GetCompressedFileSizeW
CopyFileExA
ReadConsoleOutputCharacterA
GetDefaultCommConfigW
VerLanguageNameA
_hread
SetCommConfig
WritePrivateProfileStructA
FreeEnvironmentStringsW
CreateTimerQueueTimer
FindVolumeClose
LeaveCriticalSection
WriteConsoleInputA
TlsGetValue
SetComputerNameExW
FindAtomA
ReleaseMutex
LocalUnlock
CallNamedPipeW
BuildCommDCBAndTimeoutsA
LocalAlloc
GetCommandLineA
InterlockedIncrement
CopyFileW
AddRefActCtx
OutputDebugStringW
FormatMessageW
GetPriorityClass
WritePrivateProfileStringW
GetSystemDefaultLangID
TerminateThread
GlobalUnfix
GetVersionExW
HeapValidate
_hwrite
GetWindowsDirectoryW
GetStartupInfoA
CreatePipe
GetCPInfoExW
GetSystemWindowsDirectoryW
GetSystemWow64DirectoryA
GetLastError
GetCalendarInfoW
WaitForDebugEvent
GetTickCount
DeleteVolumeMountPointW
OpenFileMappingA
CopyFileA
CreateActCtxW
SetMailslotInfo
AddConsoleAliasW
GetPrivateProfileIntW
ReadConsoleInputW
InterlockedDecrement
DefineDosDeviceA
SetVolumeMountPointA
SetThreadIdealProcessor
SetConsoleActiveScreenBuffer
SetProcessAffinityMask
SetThreadContext
GetLongPathNameW
SetConsoleTextAttribute
EndUpdateResourceW
ContinueDebugEvent
MoveFileW
ReadConsoleA
WriteConsoleA
VirtualProtect
InterlockedFlushSList
WritePrivateProfileSectionA
DeleteCriticalSection
GetPrivateProfileSectionNamesA
GetDriveTypeA
GetFileAttributesExA
LocalFileTimeToFileTime
GetVolumePathNameW
GetConsoleMode
HeapSetInformation
GetComputerNameW
FindActCtxSectionStringA
ReadProcessMemory
MoveFileExW
GetProcAddress
GlobalFix
WriteConsoleInputW
GlobalDeleteAtom
GetEnvironmentStrings
InterlockedCompareExchange
WaitNamedPipeW
GetExitCodeProcess
GetSystemTime
GetLocalTime
EnumCalendarInfoExA
OpenSemaphoreW
FreeEnvironmentStringsA
CreateIoCompletionPort
GetPrivateProfileStringA
GetPrivateProfileStructW
GetMailslotInfo
GetCommModemStatus
lstrcpyA
HeapWalk
LockFile
EndUpdateResourceA
VerSetConditionMask
GetConsoleCP
GetConsoleAliasW
GetNumberOfConsoleInputEvents
GetProfileStringA
GetQueuedCompletionStatus
AllocConsole
FindAtomW
GetNumaNodeProcessorMask
GetConsoleAliasExesLengthA
CreateMailslotA
EnumDateFormatsW
SetCommState
FileTimeToLocalFileTime
IsDebuggerPresent
GetSystemTimeAdjustment
_lread
GetConsoleAliasExesLengthW
GetWriteWatch
LoadLibraryW
GetPrivateProfileStringW
GetModuleHandleA
ReadConsoleOutputAttribute
GetFileInformationByHandle
GetProfileStringW
MoveFileA
CreateActCtxA
SetCommMask
SetMessageWaitingIndicator
AreFileApisANSI
OpenWaitableTimerW
GetProcessShutdownParameters
PeekNamedPipe
FillConsoleOutputCharacterA
FindNextVolumeMountPointA
GetThreadPriority
DeleteAtom
AddAtomW
WriteConsoleOutputCharacterA
QueryDosDeviceW
GetConsoleAliasExesW
GetBinaryTypeA
DeleteFileA
RaiseException
IsBadReadPtr
EnterCriticalSection
GetModuleFileNameW
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
CloseHandle
GetModuleHandleW
Sleep
TlsAlloc
TlsSetValue
GetCurrentThreadId
TlsFree
SetLastError
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetModuleFileNameA
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
HeapDestroy
HeapCreate
HeapFree
VirtualFree
WriteFile
HeapAlloc
HeapSize
HeapReAlloc
VirtualAlloc
GetACP
GetOEMCP
GetCPInfo
IsValidCodePage
RtlUnwind
InitializeCriticalSectionAndSpinCount
DebugBreak
OutputDebugStringA
WriteConsoleW
SetStdHandle
FlushFileBuffers
MultiByteToWideChar
SetFilePointer
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
GetConsoleOutputCP
ReadFile
CreateFileA
user32
OemToCharW
Sections
.text Size: 168KB - Virtual size: 167KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 66KB - Virtual size: 584KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 42KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ