C:\hitihejukisu\busigopus-peyitopiwat\bazi\cojigoconeha.pdb
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_b6ae7251deb7aa169a16112515e94ac61942559ceeb2451c7c9c743214fef37e.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_b6ae7251deb7aa169a16112515e94ac61942559ceeb2451c7c9c743214fef37e.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_b6ae7251deb7aa169a16112515e94ac61942559ceeb2451c7c9c743214fef37e
-
Size
246KB
-
MD5
3ad9b12cbfa962da1d348b26cedb62be
-
SHA1
3d0044c9f144ce76e2301c0c3a6ae2bd391de740
-
SHA256
b6ae7251deb7aa169a16112515e94ac61942559ceeb2451c7c9c743214fef37e
-
SHA512
1cd52b441343c71f6638dcacd2731ed415b53a271b2c064e3ea769ebdee371f52793d35bf75a77e093107b48ed1d71c6570010f25f7d4cefc4d39ffdc3b11b71
-
SSDEEP
3072:g7Jxh2xryErd36x5I2b2VpN7O+NIjzit/WrxpzbgqruXhs7sxkgaBChU/pZa9uDB:+2xmE56x5IXmiRuzbgwu6QigabwVf
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource JaffaCakes118_b6ae7251deb7aa169a16112515e94ac61942559ceeb2451c7c9c743214fef37e
Files
-
JaffaCakes118_b6ae7251deb7aa169a16112515e94ac61942559ceeb2451c7c9c743214fef37e.exe windows:5 windows x86 arch:x86
f6b674b76a065863a80dcff24fafdbed
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
CommConfigDialogA
GetDefaultCommConfigW
GetSystemWindowsDirectoryW
QueryPerformanceCounter
GetEnvironmentStringsW
SetConsoleScreenBufferSize
AddConsoleAliasW
BackupSeek
GetTickCount
GetProcessHeap
GetSystemTimeAsFileTime
ReadConsoleW
SizeofResource
GetProcessHandleCount
InitAtomTable
HeapValidate
GetModuleFileNameW
DeactivateActCtx
GetLastError
GetProcAddress
VirtualAlloc
HeapSize
BeginUpdateResourceW
GetFirmwareEnvironmentVariableW
LoadLibraryA
WriteConsoleA
LocalAlloc
GetProcessAffinityMask
GetConsoleCursorInfo
DeleteAtom
FindNextVolumeA
LCMapStringW
lstrcpyA
WriteConsoleW
GetAtomNameW
CreateFileW
HeapAlloc
EncodePointer
DecodePointer
GetCommandLineA
HeapSetInformation
GetStartupInfoW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
GetCurrentProcess
GetModuleHandleW
ExitProcess
WriteFile
GetStdHandle
HeapCreate
Sleep
EnterCriticalSection
LeaveCriticalSection
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
SetFilePointer
HeapFree
CloseHandle
GetModuleFileNameA
FreeEnvironmentStringsW
WideCharToMultiByte
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
GetCurrentProcessId
LoadLibraryW
HeapReAlloc
RtlUnwind
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
SetStdHandle
GetConsoleCP
GetConsoleMode
FlushFileBuffers
RaiseException
IsProcessorFeaturePresent
MultiByteToWideChar
GetStringTypeW
user32
MessageBeep
advapi32
AdjustTokenGroups
Sections
.text Size: 104KB - Virtual size: 103KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 15KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 120KB - Virtual size: 120KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ