C:\bamapu51\tatemuke95\haxuwih zih\gif.pdb
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_c016c9343b417230df66f2c2148811f27ca25f3363c682d3440e3893dedd5dbd.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_c016c9343b417230df66f2c2148811f27ca25f3363c682d3440e3893dedd5dbd.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_c016c9343b417230df66f2c2148811f27ca25f3363c682d3440e3893dedd5dbd
-
Size
437KB
-
MD5
99391680e3bcedf82db64babea33abb2
-
SHA1
d35c9932d55e227d990a7a55d379f6b53e9246ca
-
SHA256
c016c9343b417230df66f2c2148811f27ca25f3363c682d3440e3893dedd5dbd
-
SHA512
16f31e8bd07dcaf58ada9d9f23f8620c5f69cde25cd9726f750d189e809a4652499e060d590abf958184ccec85483af79de82229e3407806ce4595a4af5139bb
-
SSDEEP
12288:2Ffs9HlEZBK4dxybglYn/0kWQTokMJ5aoAoyqkNYx6iTd2+:2SlSrPTYnsJ5GN1a
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource JaffaCakes118_c016c9343b417230df66f2c2148811f27ca25f3363c682d3440e3893dedd5dbd
Files
-
JaffaCakes118_c016c9343b417230df66f2c2148811f27ca25f3363c682d3440e3893dedd5dbd.exe windows:5 windows x86 arch:x86
9fee089739ae1ac3998b270391083afc
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetNamedPipeHandleStateW
CreateNamedPipeA
CallNamedPipeW
TerminateThread
GetExitCodeProcess
GetVersionExW
VerifyVersionInfoW
SetConsoleCP
GetConsoleAliasesLengthA
VerLanguageNameA
FindFirstFileExA
VerifyVersionInfoA
FreeEnvironmentStringsA
GetProcessPriorityBoost
SetVolumeMountPointW
GetLongPathNameA
CopyFileA
TlsGetValue
SetConsoleCursorInfo
TzSpecificLocalTimeToSystemTime
AddAtomA
ReleaseMutex
BuildCommDCBAndTimeoutsA
GetProcAddress
LoadLibraryA
LocalAlloc
SleepEx
TlsSetValue
MoveFileA
GetCommandLineW
InterlockedDecrement
DeleteFileW
CreateActCtxA
SetFileAttributesA
GetPrivateProfileIntW
GetProcessHeap
CreateNamedPipeW
ReadConsoleOutputCharacterA
GetStartupInfoA
GetDiskFreeSpaceExW
GetCPInfoExW
GetWindowsDirectoryW
GetSystemWow64DirectoryA
SetLastError
GetProfileStringA
GetCalendarInfoW
GetTickCount
GetStringTypeA
DebugBreak
FindFirstFileA
lstrcmpA
WriteFile
GetConsoleMode
lstrcatW
SetFirmwareEnvironmentVariableA
InterlockedExchange
SetCriticalSectionSpinCount
DefineDosDeviceW
EndUpdateResourceA
WriteConsoleW
InterlockedIncrement
GetPrivateProfileSectionW
WritePrivateProfileSectionW
GetPrivateProfileStructA
TryEnterCriticalSection
GetPrivateProfileStructW
GetFileAttributesExW
HeapWalk
CreateIoCompletionPort
PeekConsoleInputA
GetNumberFormatW
GetQueuedCompletionStatus
FindResourceExW
SetLocalTime
CreateSemaphoreA
GetThreadLocale
SetFileShortNameA
lstrcpyW
ReplaceFileA
MoveFileExA
GetConsoleCP
GetVolumePathNameA
FlushConsoleInputBuffer
SearchPathA
FreeConsole
GetConsoleAliasExesLengthW
WriteConsoleInputW
LocalShrink
GetCommState
EnumSystemLocalesW
ProcessIdToSessionId
SetMessageWaitingIndicator
DeleteTimerQueueTimer
GetWriteWatch
OpenSemaphoreW
GetConsoleScreenBufferInfo
ClearCommBreak
TlsAlloc
GetSystemTimeAdjustment
GetComputerNameW
HeapValidate
GetLastError
WaitForMultipleObjectsEx
SignalObjectAndWait
GetSystemPowerStatus
VirtualLock
SetWaitableTimer
ChangeTimerQueueTimer
GetProcessHandleCount
FatalAppExitA
lstrcpynW
SetNamedPipeHandleState
FillConsoleOutputCharacterA
GetCompressedFileSizeW
FindNextVolumeMountPointA
GetFullPathNameA
WriteProfileStringA
GlobalAddAtomW
LeaveCriticalSection
SetCurrentDirectoryW
OpenMutexW
LockFile
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
EncodePointer
DecodePointer
IsBadReadPtr
RtlUnwind
RaiseException
GetModuleHandleW
ExitProcess
DeleteFileA
HeapSetInformation
GetStartupInfoW
WideCharToMultiByte
LCMapStringW
MultiByteToWideChar
GetCPInfo
GetModuleFileNameW
InitializeCriticalSectionAndSpinCount
IsProcessorFeaturePresent
HeapAlloc
GetModuleFileNameA
HeapReAlloc
HeapSize
HeapQueryInformation
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapFree
HeapCreate
GetACP
GetOEMCP
IsValidCodePage
GetCurrentThreadId
TlsFree
GetStdHandle
LoadLibraryW
GetLocaleInfoW
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetStringTypeW
GetLocaleInfoA
IsValidLocale
EnumSystemLocalesA
GetUserDefaultLCID
OutputDebugStringA
OutputDebugStringW
SetFilePointer
SetStdHandle
CreateFileW
CloseHandle
FlushFileBuffers
Sections
.text Size: 361KB - Virtual size: 361KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 35KB - Virtual size: 539KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vocosuh Size: 512B - Virtual size: 5B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.hido Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ