C:\loxuzonuv\tevudalecol\kodelutefuce\pufe.pdb
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_4d9b3eaae7f591289d07eb6df10c78b68ad583b011ece723d4aaa669e19d8e58.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_4d9b3eaae7f591289d07eb6df10c78b68ad583b011ece723d4aaa669e19d8e58.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_4d9b3eaae7f591289d07eb6df10c78b68ad583b011ece723d4aaa669e19d8e58
-
Size
286KB
-
MD5
30f334034890bf4e9978e88c3a8d289e
-
SHA1
c01f11ade66a776369c5e661ade581f5141f7e53
-
SHA256
4d9b3eaae7f591289d07eb6df10c78b68ad583b011ece723d4aaa669e19d8e58
-
SHA512
b3278c0ffca87a27d3bc80743a80b830cf94d88bee4791e21d1a0d9f31d719593e993ca897e86cb0d2b9262745bad7a5db04feab3ec2ad0de5640131863fc774
-
SSDEEP
3072:FFVyYf0kx6mLP1mrJpQ6mld1JCHyOzoLOS7XuWVOO5Z8jVw7DWk7MW+CJUBU4wuj:7Smz1UJ50JCHyU0XGUZiVOCYBJh4b
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource JaffaCakes118_4d9b3eaae7f591289d07eb6df10c78b68ad583b011ece723d4aaa669e19d8e58
Files
-
JaffaCakes118_4d9b3eaae7f591289d07eb6df10c78b68ad583b011ece723d4aaa669e19d8e58.exe windows:5 windows x86 arch:x86
61f5dd277d7d233f85b676d434ad016e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
SearchPathW
GetConsoleAliasesLengthW
TlsGetValue
GetCPInfo
SetDllDirectoryW
InterlockedIncrement
ReadConsoleA
GetProfileSectionA
SetConsoleScreenBufferSize
SetVolumeMountPointW
FreeEnvironmentStringsA
IsBadReadPtr
GetConsoleAliasesLengthA
GetSystemTimeAsFileTime
GetPrivateProfileStringW
GetSystemWow64DirectoryA
CreateActCtxW
ActivateActCtx
GlobalAlloc
GetSystemDirectoryW
ReadConsoleInputA
CopyFileW
GetSystemWindowsDirectoryA
SetConsoleMode
HeapValidate
GetModuleFileNameW
CompareStringW
GetStartupInfoW
WritePrivateProfileStringW
GetNamedPipeHandleStateW
VerifyVersionInfoW
FindFirstFileExA
GetHandleInformation
GetLastError
IsDBCSLeadByteEx
GetCurrentDirectoryW
SetLastError
BackupRead
GetProcAddress
IsBadHugeWritePtr
CreateNamedPipeA
IsValidCodePage
GlobalGetAtomNameA
BuildCommDCBW
OpenWaitableTimerA
LoadLibraryA
OpenWaitableTimerW
SetConsoleCursorInfo
GetFileTime
SetProcessShutdownParameters
GetVersionExA
GetWindowsDirectoryW
DeleteFileW
TlsFree
CommConfigDialogW
LocalFileTimeToFileTime
CreateFileW
MoveFileA
GetCommandLineA
HeapSetInformation
EnterCriticalSection
LeaveCriticalSection
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
DecodePointer
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EncodePointer
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
InterlockedDecrement
GetModuleHandleW
ExitProcess
GetModuleFileNameA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
TlsAlloc
TlsSetValue
HeapCreate
WriteFile
SetFilePointer
GetConsoleCP
GetConsoleMode
OutputDebugStringA
WriteConsoleW
OutputDebugStringW
LoadLibraryW
RtlUnwind
GetACP
GetOEMCP
HeapAlloc
HeapReAlloc
HeapSize
HeapQueryInformation
HeapFree
FlushFileBuffers
SetStdHandle
MultiByteToWideChar
IsProcessorFeaturePresent
LCMapStringW
GetStringTypeW
CloseHandle
RaiseException
user32
GetListBoxInfo
GetMenuInfo
winhttp
WinHttpWriteData
Sections
.text Size: 190KB - Virtual size: 189KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 39.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.seganup Size: 512B - Virtual size: 128B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 66KB - Virtual size: 66KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ