C:\wafot27\mowojixupa\megiyahoze-kecogixujin47_tarur.pdb
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_98a711617a2ec118caeb49fadc1e28e233e556d5ab21d39def5f7219fb50ddf3.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_98a711617a2ec118caeb49fadc1e28e233e556d5ab21d39def5f7219fb50ddf3.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_98a711617a2ec118caeb49fadc1e28e233e556d5ab21d39def5f7219fb50ddf3
-
Size
160KB
-
MD5
7bb2733e97ba152441a12ce8af74aaed
-
SHA1
24909286b6b30a7eacf9ea85d801025758c2855c
-
SHA256
98a711617a2ec118caeb49fadc1e28e233e556d5ab21d39def5f7219fb50ddf3
-
SHA512
e3169bac012d03ef8f7b40646c77e5298f8977ed3dd87f320c43e0b75f709c6f461216ca85e644cc1d7f3d3aa4dd4fdf0853cbcd0aa05f2730b1e71561db7dbc
-
SSDEEP
1536:fae1yygZJ4PWKemQPvB450xEmnVGgkwyYsZSn/wnmwophe6e2SohlD222CHRPARx:a1AuRzSdDYsI/wnrsBSohN21CH9ARo2
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource JaffaCakes118_98a711617a2ec118caeb49fadc1e28e233e556d5ab21d39def5f7219fb50ddf3
Files
-
JaffaCakes118_98a711617a2ec118caeb49fadc1e28e233e556d5ab21d39def5f7219fb50ddf3.exe windows:5 windows x86 arch:x86
fbe4cce31825940f582af9763f8c6fb6
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetDefaultCommConfigW
HeapAlloc
GetConsoleAliasA
GetEnvironmentStringsW
SetConsoleScreenBufferSize
SizeofResource
FindNextVolumeW
SetConsoleCursorPosition
WriteConsoleW
GetModuleFileNameW
SetLastError
GetProcAddress
VirtualAlloc
GetFirmwareEnvironmentVariableW
GetAtomNameA
LoadLibraryA
WriteConsoleA
LocalAlloc
BeginUpdateResourceA
GetModuleFileNameA
EraseTape
AddConsoleAliasA
lstrcpyW
LCMapStringA
SetProcessAffinityMask
CreateFileW
ReadFile
EncodePointer
DecodePointer
GetCommandLineA
HeapSetInformation
GetStartupInfoW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
GetCurrentProcess
IsProcessorFeaturePresent
EnterCriticalSection
LeaveCriticalSection
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
GetModuleHandleW
ExitProcess
WriteFile
HeapCreate
Sleep
HeapSize
RtlUnwind
GetLastError
SetFilePointer
HeapFree
CloseHandle
FreeEnvironmentStringsW
WideCharToMultiByte
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
GetCurrentThreadId
InterlockedDecrement
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
RaiseException
GetConsoleCP
GetConsoleMode
LoadLibraryW
HeapReAlloc
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
CreateFileA
SetStdHandle
FlushFileBuffers
MultiByteToWideChar
LCMapStringW
GetStringTypeW
SetEndOfFile
GetProcessHeap
user32
GetCursorPos
gdi32
GetCharWidth32A
advapi32
CloseEventLog
Sections
.text Size: 105KB - Virtual size: 105KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 19KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.fifeg Size: 1024B - Virtual size: 626B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.magejo Size: 512B - Virtual size: 23B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.win Size: 1024B - Virtual size: 963B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 26KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ