C:\ged.pdb
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_dcdc08d7a2a8a7bf9e9c13f7fc0f98cabe9cf01b9393385d99dc78d7aae7635d.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_dcdc08d7a2a8a7bf9e9c13f7fc0f98cabe9cf01b9393385d99dc78d7aae7635d.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_dcdc08d7a2a8a7bf9e9c13f7fc0f98cabe9cf01b9393385d99dc78d7aae7635d
-
Size
344KB
-
MD5
0b19684e42bf520f8f19611243f09f25
-
SHA1
8adc00499e77918f089b64af6442883127d8d5c2
-
SHA256
dcdc08d7a2a8a7bf9e9c13f7fc0f98cabe9cf01b9393385d99dc78d7aae7635d
-
SHA512
81509fad5379c5fc6b3f1a1dd6121d2bc879c82550b3783c415df610c70c3592c0aa4cf593fec136f112d9b6d6a8bded2dd29f5a9cb17355a49680e6089367cf
-
SSDEEP
6144:ygoASmiF7pGffyhLsxAOC9H+DWfGMI8WrZn:d4ayxsxAOC9eDWf05V
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource JaffaCakes118_dcdc08d7a2a8a7bf9e9c13f7fc0f98cabe9cf01b9393385d99dc78d7aae7635d
Files
-
JaffaCakes118_dcdc08d7a2a8a7bf9e9c13f7fc0f98cabe9cf01b9393385d99dc78d7aae7635d.exe windows:5 windows x86 arch:x86
9a8dc8c7cdfd1f0f0b247a3b1f86c91c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
OpenFileMappingA
FindFirstVolumeW
TerminateProcess
GetExitCodeProcess
GetVersionExA
VerifyVersionInfoA
CopyFileExA
GetConsoleMode
GetConsoleCP
VerLanguageNameW
GetDriveTypeW
FindFirstChangeNotificationW
FreeEnvironmentStringsW
GetProcessPriorityBoost
SetVolumeMountPointA
GetLongPathNameA
CopyFileW
TlsGetValue
VerifyVersionInfoW
GetConsoleCursorInfo
LocalHandle
SystemTimeToTzSpecificLocalTime
GetProcessShutdownParameters
MultiByteToWideChar
LocalUnlock
GetNamedPipeHandleStateW
BuildCommDCBAndTimeoutsW
GetProcAddress
GetModuleHandleA
GlobalAlloc
Sleep
MoveFileA
GetCommandLineA
InterlockedDecrement
DeleteFileW
GetVolumePathNamesForVolumeNameW
GetPrivateProfileStringA
GetPrivateProfileIntA
HeapSize
GetProcessHeap
CreateNamedPipeA
SetFileShortNameW
GetStartupInfoW
GetEnvironmentVariableA
GetCPInfoExA
GetWindowsDirectoryA
GetSystemWow64DirectoryA
GetLastError
WriteProfileSectionW
GetCalendarInfoW
SetLastError
GetExitCodeThread
WaitForDebugEvent
FindFirstFileA
ReadFileScatter
ReadFile
SetDefaultCommConfigA
GetNumberOfConsoleMouseButtons
GlobalWire
WritePrivateProfileSectionA
WriteProfileStringA
lstrcatW
FindCloseChangeNotification
CreateActCtxA
InterlockedPopEntrySList
InterlockedExchange
SetConsoleTitleW
DefineDosDeviceW
LoadLibraryW
WritePrivateProfileStringA
WaitNamedPipeW
HeapSetInformation
UnregisterWait
PeekConsoleInputA
GetNumberFormatA
DeleteFileA
LoadModule
GetPrivateProfileSectionNamesW
EnumTimeFormatsA
SetLocalTime
FindNextFileA
FindFirstFileW
FreeEnvironmentStringsA
CreateSemaphoreW
OutputDebugStringW
SetFileShortNameA
lstrcpyW
HeapWalk
CreateHardLinkW
RaiseException
GetSystemTime
UnlockFile
EnumCalendarInfoExA
MoveFileExA
GetVolumePathNamesForVolumeNameA
SetConsoleScreenBufferSize
SearchPathW
IsBadStringPtrW
GetAtomNameW
GetConsoleAliasExesLengthA
WriteConsoleInputW
LocalLock
SetCommState
EnumSystemLocalesA
GetNumaHighestNodeNumber
SetEndOfFile
ResetWriteWatch
SetUnhandledExceptionFilter
OpenSemaphoreA
GetLargestConsoleWindowSize
GetProfileStringW
ZombifyActCtx
EnumDateFormatsW
SetSystemTimeAdjustment
OpenMutexW
GetComputerNameA
HeapValidate
CommConfigDialogA
OpenMutexA
GetStringTypeA
SetSystemPowerState
FindResourceA
SetTimerQueueTimer
EnumResourceNamesW
GetProcessTimes
RegisterWaitForSingleObject
IsBadReadPtr
GetCurrentProcessId
FatalAppExitW
GetFileAttributesW
lstrcpynW
DisconnectNamedPipe
FillConsoleOutputCharacterA
GetCompressedFileSizeA
GetFullPathNameA
WriteProfileStringW
SetInformationJobObject
GlobalAddAtomA
EnumDateFormatsA
TerminateJobObject
QueryDosDeviceA
LeaveCriticalSection
SetCurrentDirectoryA
CreateTimerQueueTimer
GetBinaryTypeW
CloseHandle
EncodePointer
DecodePointer
GetCommandLineW
IsProcessorFeaturePresent
TlsAlloc
TlsSetValue
GetCurrentThreadId
TlsFree
GetModuleHandleW
InterlockedIncrement
ExitProcess
EnterCriticalSection
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
GetCurrentProcess
UnhandledExceptionFilter
IsDebuggerPresent
GetModuleFileNameW
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
GetEnvironmentStringsW
HeapCreate
WriteFile
GetACP
GetOEMCP
GetCPInfo
IsValidCodePage
RtlUnwind
HeapAlloc
GetModuleFileNameA
HeapReAlloc
HeapQueryInformation
HeapFree
SetFilePointer
WideCharToMultiByte
OutputDebugStringA
WriteConsoleW
LCMapStringW
GetStringTypeW
FlushFileBuffers
SetStdHandle
CreateFileW
user32
GetMenuItemID
GetCursorInfo
Sections
.text Size: 231KB - Virtual size: 230KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 55KB - Virtual size: 562KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 42KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ