C:\lapedujukis_62-pezoc day100\ga.pdb
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_59376aedb4b6ed98c11e98f46edff7c62e159a6d4d63ed2eaaa46805006b0085.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_59376aedb4b6ed98c11e98f46edff7c62e159a6d4d63ed2eaaa46805006b0085.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_59376aedb4b6ed98c11e98f46edff7c62e159a6d4d63ed2eaaa46805006b0085
-
Size
343KB
-
MD5
8bac9589ab10735825e69f14afe283b4
-
SHA1
d7e4c66cd54b61258a08b3ef44f6c6919b3b51e4
-
SHA256
59376aedb4b6ed98c11e98f46edff7c62e159a6d4d63ed2eaaa46805006b0085
-
SHA512
c48d4a9dc8387a1a81c77095f060c874a3c0860d4070769ccbf3fd92b9d43310a6dc62b17f7f6f30cfc61b1e7baed3b465f9eecdf8d0d2aca9a5420cbba42dc5
-
SSDEEP
3072:vPW6RBNZQyyT0TXOtpkAx1O/kCcNVPImEWOrle9rcQLRDLspSiyl2kBxLWhW/9X6:3DUEk/OqIQOrletcQVH2kDaQ/9O3tHt
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource JaffaCakes118_59376aedb4b6ed98c11e98f46edff7c62e159a6d4d63ed2eaaa46805006b0085
Files
-
JaffaCakes118_59376aedb4b6ed98c11e98f46edff7c62e159a6d4d63ed2eaaa46805006b0085.exe windows:5 windows x86 arch:x86
17d363df494bcb38053d0872594e66c2
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
CommConfigDialogA
LoadResource
SetWaitableTimer
SetDllDirectoryW
InterlockedIncrement
_lwrite
ReadConsoleA
ZombifyActCtx
GetSystemWindowsDirectoryW
GetNamedPipeHandleStateA
SetConsoleScreenBufferSize
FreeEnvironmentStringsA
CreateNamedPipeW
GetSystemTimeAsFileTime
GetPrivateProfileStringW
GetWindowsDirectoryA
GetSystemWow64DirectoryA
QueryActCtxW
CreateActCtxW
GetSystemTimes
GetDriveTypeA
GetSystemDirectoryW
GlobalFindAtomA
GetConsoleMode
ReadConsoleInputA
CopyFileW
SetVolumeMountPointA
GetVersionExW
HeapValidate
GetVolumePathNamesForVolumeNameW
VerifyVersionInfoA
GetModuleFileNameW
CompareStringW
GetACP
lstrlenW
TlsGetValue
GetStartupInfoA
FindFirstFileExA
GetHandleInformation
GetLastError
IsDBCSLeadByteEx
GetCurrentDirectoryW
SetLastError
GetProcAddress
GetLongPathNameA
SetFirmwareEnvironmentVariableW
CopyFileA
GetConsoleDisplayMode
GlobalGetAtomNameA
FindClose
GetPrivateProfileStringA
LoadLibraryA
LocalAlloc
IsWow64Process
WritePrivateProfileStringA
SetCurrentDirectoryW
SetFileApisToANSI
QueryDosDeviceW
GetModuleFileNameA
WriteProfileStringA
GetModuleHandleA
GetProcessShutdownParameters
CreateWaitableTimerW
BuildCommDCBA
GetConsoleCursorInfo
TlsAlloc
FileTimeToLocalFileTime
GetProfileSectionW
CreateFileW
CloseHandle
SearchPathW
GetConsoleAliasesLengthW
VerifyVersionInfoW
GetComputerNameA
DeleteFileA
MultiByteToWideChar
GetCommandLineA
HeapSetInformation
GetStartupInfoW
IsProcessorFeaturePresent
EncodePointer
DecodePointer
InterlockedDecrement
GetOEMCP
GetCPInfo
IsValidCodePage
TlsSetValue
GetCurrentThreadId
TlsFree
GetModuleHandleW
EnterCriticalSection
LeaveCriticalSection
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
ExitProcess
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
IsBadReadPtr
HeapCreate
WriteFile
RaiseException
GetStringTypeW
OutputDebugStringA
WriteConsoleW
OutputDebugStringW
LoadLibraryW
RtlUnwind
LCMapStringW
SetFilePointer
GetConsoleCP
HeapAlloc
HeapReAlloc
HeapSize
HeapQueryInformation
HeapFree
FlushFileBuffers
SetStdHandle
user32
GetMessageTime
gdi32
GetBitmapBits
advapi32
SetKernelObjectSecurity
Sections
.text Size: 238KB - Virtual size: 238KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 39.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 25KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 73KB - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ