C:\xojezorasave3\xesukaluzim95\puxasenahut.pdb
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_92a985d159dbf16e9509eace5334644732a48f00ada8e426a7728e9e809a7c67.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_92a985d159dbf16e9509eace5334644732a48f00ada8e426a7728e9e809a7c67.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_92a985d159dbf16e9509eace5334644732a48f00ada8e426a7728e9e809a7c67
-
Size
289KB
-
MD5
5f83cbb604e017a7ec6e46776e538e24
-
SHA1
3219e6f27f3cebd7d499e13cf9e1146c186333cf
-
SHA256
92a985d159dbf16e9509eace5334644732a48f00ada8e426a7728e9e809a7c67
-
SHA512
97843c593e77064fb1a764bdbadf92742c473f5a20b5ae5024be7bf65516f0cc0c8d558cda57032b00bb634189314f0322a340407eaf19ced5da680cafba2afb
-
SSDEEP
6144:2lfibHny83UbS4sqvfBxBbhAXY0NMHUBL5:2hqUbS4sqvlKXlYG9
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource JaffaCakes118_92a985d159dbf16e9509eace5334644732a48f00ada8e426a7728e9e809a7c67
Files
-
JaffaCakes118_92a985d159dbf16e9509eace5334644732a48f00ada8e426a7728e9e809a7c67.exe windows:5 windows x86 arch:x86
a24faa9f4919afc00d25c1c4d020aae4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
SearchPathW
GetConsoleAliasesLengthW
TlsGetValue
GetCPInfo
SetDllDirectoryW
InterlockedIncrement
ReadConsoleA
GetProfileSectionA
SetConsoleScreenBufferSize
SetVolumeMountPointW
FreeEnvironmentStringsA
IsBadReadPtr
GetConsoleAliasesLengthA
GetSystemTimeAsFileTime
GetPrivateProfileStringW
GetSystemWow64DirectoryA
CreateActCtxW
ActivateActCtx
GlobalAlloc
GetSystemDirectoryW
ReadConsoleInputA
CopyFileW
GetSystemWindowsDirectoryA
SetConsoleMode
HeapValidate
GetModuleFileNameW
CompareStringW
GetStartupInfoW
WritePrivateProfileStringW
GetNamedPipeHandleStateW
VerifyVersionInfoW
FindFirstFileExA
GetHandleInformation
GetLastError
IsDBCSLeadByteEx
GetCurrentDirectoryW
SetLastError
BackupRead
GetProcAddress
IsBadHugeWritePtr
IsValidCodePage
GlobalGetAtomNameA
BuildCommDCBW
OpenWaitableTimerA
LoadLibraryA
OpenWaitableTimerW
SetConsoleCursorInfo
GetFileTime
SetProcessShutdownParameters
GetVersionExA
GetWindowsDirectoryW
DeleteFileW
TlsFree
CommConfigDialogW
LocalFileTimeToFileTime
CreateFileW
MoveFileA
GetCommandLineA
HeapSetInformation
EnterCriticalSection
LeaveCriticalSection
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
DecodePointer
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EncodePointer
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
InterlockedDecrement
GetModuleHandleW
ExitProcess
GetModuleFileNameA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
TlsAlloc
TlsSetValue
HeapCreate
WriteFile
SetFilePointer
GetConsoleCP
GetConsoleMode
OutputDebugStringA
WriteConsoleW
OutputDebugStringW
LoadLibraryW
RtlUnwind
GetACP
GetOEMCP
HeapAlloc
HeapReAlloc
HeapSize
HeapQueryInformation
HeapFree
FlushFileBuffers
SetStdHandle
MultiByteToWideChar
IsProcessorFeaturePresent
LCMapStringW
GetStringTypeW
CloseHandle
RaiseException
user32
GetListBoxInfo
GetMenuInfo
winhttp
WinHttpWriteData
Sections
.text Size: 190KB - Virtual size: 189KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 39.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.wuyuw Size: 512B - Virtual size: 128B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 26KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 66KB - Virtual size: 66KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ