C:\sasuburebom.pdb
Static task
static1
Behavioral task
behavioral1
Sample
3986d35b5c4b2c266cd121b72b648294036863841102e850592b9ac9f26afecd.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3986d35b5c4b2c266cd121b72b648294036863841102e850592b9ac9f26afecd.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_af4484677bcc32b79a4938c21ca459fd0262ed50f61f77aef6cc415af4d1f7fd
-
Size
678KB
-
MD5
bf1ae2d5ee4b8a4b6ed1aac1453d8515
-
SHA1
2ac2380756fbe4a1f043f614d21c74b2ef1460af
-
SHA256
af4484677bcc32b79a4938c21ca459fd0262ed50f61f77aef6cc415af4d1f7fd
-
SHA512
b60e40ca4d4b15901d3c41df12a65a2bb21fd163e6c4f44c0f5b7f6c76e99c4f1aa3e171d82d13459a3ca8445d439dc8a6c5c00486bc8f3281e9d014be0da8b4
-
SSDEEP
12288:yDFz4Gz9sgIV/MK9V5Sd0pQy8lTAjC2FlC1sNMqbFY4MGtzcRgscp:GN4GzlkMgzrp4EC23C1sNMqxWWcRgl
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/3986d35b5c4b2c266cd121b72b648294036863841102e850592b9ac9f26afecd
Files
-
JaffaCakes118_af4484677bcc32b79a4938c21ca459fd0262ed50f61f77aef6cc415af4d1f7fd.zip
-
3986d35b5c4b2c266cd121b72b648294036863841102e850592b9ac9f26afecd.exe windows:5 windows x86 arch:x86
18d6edbf6cd270b11d781857738bea6a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
VerifyVersionInfoW
WriteConsoleInputA
EnumDateFormatsW
CopyFileExW
DnsHostnameToComputerNameW
FindNextFileW
ReadConsoleOutputCharacterW
SetConsoleActiveScreenBuffer
LockFile
GetProfileSectionW
QueryDosDeviceW
RequestWakeupLatency
GetProcessPriorityBoost
GetDriveTypeW
GlobalGetAtomNameA
DeleteFileW
FindNextVolumeMountPointW
TlsSetValue
SizeofResource
WriteConsoleInputW
GetConsoleTitleW
GetComputerNameExW
OpenEventA
CallNamedPipeA
GetModuleHandleA
GetSystemDirectoryA
GetDriveTypeA
BuildCommDCBAndTimeoutsA
GetProcAddress
GetShortPathNameA
DeleteFileA
GetCommandLineW
InterlockedIncrement
InterlockedExchange
CopyFileW
CreateActCtxW
FormatMessageA
GetModuleHandleW
EnterCriticalSection
FindNextVolumeA
CreateIoCompletionPort
LoadLibraryA
CreateNamedPipeA
GetSystemDefaultLangID
GetConsoleAliasesLengthA
WriteProfileSectionW
AddAtomW
InterlockedDecrement
HeapFree
_hread
InterlockedCompareExchange
GetStartupInfoW
CreateMailslotW
GetCPInfoExW
GetSystemWow64DirectoryW
GetLastError
GetPrivateProfileIntW
GetConsoleAliasExesLengthW
WaitForDebugEvent
SetLastError
VerifyVersionInfoA
GetDefaultCommConfigA
VirtualAlloc
GetACP
lstrcatW
GetConsoleAliasA
GetDiskFreeSpaceExA
TerminateProcess
EnumResourceLanguagesA
SetConsoleTextAttribute
GlobalGetAtomNameW
CreateJobSet
MoveFileW
GetComputerNameW
EnumSystemLocalesA
WritePrivateProfileSectionW
WritePrivateProfileStructA
GetPrivateProfileSectionNamesW
GetFileAttributesW
FileTimeToSystemTime
SetTapeParameters
lstrcmpW
SetEvent
MoveFileA
CreateMutexW
FindResourceA
GetCommState
CreateFiber
GetConsoleFontSize
LocalAlloc
SetFileShortNameA
lstrcpyW
HeapLock
GetFileAttributesA
SetCalendarInfoW
GetSystemWindowsDirectoryW
SetComputerNameA
GetConsoleAliasesW
EnumDateFormatsExW
GetPrivateProfileStructW
LocalFlags
OpenWaitableTimerA
EnumResourceNamesW
CreateFileMappingA
SetProcessShutdownParameters
lstrcpynW
GetFullPathNameA
WriteConsoleW
FreeUserPhysicalPages
WriteConsoleOutputCharacterW
OpenJobObjectW
CreateFileA
SetCurrentDirectoryA
GlobalWire
GetFileInformationByHandle
CommConfigDialogW
CloseHandle
LoadLibraryW
LocalFree
Sleep
InitializeCriticalSection
DeleteCriticalSection
LeaveCriticalSection
RaiseException
RtlUnwind
WideCharToMultiByte
GetCommandLineA
GetStartupInfoA
HeapValidate
IsBadReadPtr
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetModuleFileNameW
GetCurrentProcess
IsDebuggerPresent
TlsGetValue
TlsAlloc
GetCurrentThreadId
TlsFree
GetOEMCP
GetCPInfo
IsValidCodePage
SetFilePointer
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
ExitProcess
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
HeapDestroy
HeapCreate
VirtualFree
WriteFile
HeapAlloc
HeapSize
HeapReAlloc
FlushFileBuffers
GetConsoleCP
GetConsoleMode
DebugBreak
OutputDebugStringA
OutputDebugStringW
InitializeCriticalSectionAndSpinCount
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
user32
CharToOemBuffW
CharUpperW
GetMessageTime
LoadMenuW
advapi32
InitiateSystemShutdownW
Sections
.text Size: 198KB - Virtual size: 198KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 586KB - Virtual size: 622KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.yisoha Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.wejan Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.josiy Size: 512B - Virtual size: 150B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ