C:\vorid_domiy\pidanoba.pdb
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_de17973ae83b8d093085f6288d74a8dcbccac465f0201030ea223b1b38cb29ff.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_de17973ae83b8d093085f6288d74a8dcbccac465f0201030ea223b1b38cb29ff.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_de17973ae83b8d093085f6288d74a8dcbccac465f0201030ea223b1b38cb29ff
-
Size
304KB
-
MD5
22a413c15a4a559e00bb46a7ea9c8328
-
SHA1
75e0330c2ddced4d2f752709e2f2733f2557f922
-
SHA256
de17973ae83b8d093085f6288d74a8dcbccac465f0201030ea223b1b38cb29ff
-
SHA512
fca580091b1b058c3602a92d4645d206a323300e10664ec7085ef4270c269d88d5442770cafa6886aedc8ee6472959f3f27090e5ac6d8a0759bc1d9e5de3c7bf
-
SSDEEP
6144:VTjfugLvStP73OTkf87CjHIWRLIIL6MCOhxxFeTr/ekI:VrrStakfKGHP/L6+zxF6L
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource JaffaCakes118_de17973ae83b8d093085f6288d74a8dcbccac465f0201030ea223b1b38cb29ff
Files
-
JaffaCakes118_de17973ae83b8d093085f6288d74a8dcbccac465f0201030ea223b1b38cb29ff.exe windows:5 windows x86 arch:x86
401c37f2bd821b3afe64e4a9a74e43f3
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
HeapReAlloc
GlobalDeleteAtom
GetLocaleInfoA
InterlockedIncrement
GetQueuedCompletionStatus
GetEnvironmentStringsW
SetEvent
ReadConsoleW
GetCommandLineA
CreateActCtxW
GlobalAlloc
CopyFileW
FreeConsole
LeaveCriticalSection
GetFileAttributesA
HeapCreate
WriteConsoleW
lstrlenW
ReleaseSemaphore
SetConsoleTitleA
FlushFileBuffers
DeactivateActCtx
GetProcAddress
BeginUpdateResourceW
RemoveDirectoryA
VerLanguageNameW
LocalAlloc
SetConsoleWindowInfo
SetEnvironmentVariableA
GetModuleFileNameA
SetConsoleTitleW
GetModuleHandleA
EraseTape
VirtualProtect
EndUpdateResourceA
FindFirstVolumeW
GetCurrentProcessId
GetPrivateProfileSectionW
FindNextVolumeA
lstrcpyW
GetConsoleOutputCP
InterlockedDecrement
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
GetLastError
HeapFree
HeapAlloc
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetStartupInfoW
RtlUnwind
RaiseException
LCMapStringA
WideCharToMultiByte
MultiByteToWideChar
LCMapStringW
GetCPInfo
VirtualFree
VirtualAlloc
GetModuleHandleW
ExitProcess
WriteFile
GetStdHandle
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
SetHandleCount
GetFileType
GetStartupInfoA
SetFilePointer
GetACP
GetOEMCP
IsValidCodePage
GetModuleFileNameW
FreeEnvironmentStringsW
GetCommandLineW
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
HeapSize
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
GetStringTypeA
GetStringTypeW
InitializeCriticalSectionAndSpinCount
LoadLibraryA
CloseHandle
CreateFileA
SetStdHandle
GetConsoleCP
GetConsoleMode
GetLocaleInfoW
SetEndOfFile
GetProcessHeap
ReadFile
WriteConsoleA
Exports
Exports
@SetFirstVice@8
Sections
.text Size: 133KB - Virtual size: 133KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 22KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 137KB - Virtual size: 137KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ