C:\socuyujo17\dorejeko\rujogiwafej\got joj.pdb
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_86054a9f4dc9fc201137e9dabab67b47541cad795c5f9c307aebb95a74032385.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_86054a9f4dc9fc201137e9dabab67b47541cad795c5f9c307aebb95a74032385.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_86054a9f4dc9fc201137e9dabab67b47541cad795c5f9c307aebb95a74032385
-
Size
285KB
-
MD5
020b25befc4912d8e055a74e89795964
-
SHA1
8b51f165c506a3c002345828a6fdf6458a20ad00
-
SHA256
86054a9f4dc9fc201137e9dabab67b47541cad795c5f9c307aebb95a74032385
-
SHA512
738ab2c84b1071de84983f896e26d6754cc052fec96580cc21af96fb2452d8f053a3d60cb4572f3208dee683031f58803c770e22901f467cee9b6b888bd3551d
-
SSDEEP
6144:qBL5PZaxPmyPhDh8vICUCe02DuMY0Et6Hdz:GxaxPZh1iICUCe02HFEwHdz
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource JaffaCakes118_86054a9f4dc9fc201137e9dabab67b47541cad795c5f9c307aebb95a74032385
Files
-
JaffaCakes118_86054a9f4dc9fc201137e9dabab67b47541cad795c5f9c307aebb95a74032385.exe windows:5 windows x86 arch:x86
a5effb4de201aefae267d5eef9a314ac
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
SetDllDirectoryW
_lwrite
InterlockedDecrement
GetNamedPipeHandleStateA
SetHandleInformation
SetConsoleScreenBufferSize
CancelWaitableTimer
SetVolumeMountPointW
FindFirstFileExW
FreeEnvironmentStringsA
GetModuleHandleW
GetSystemTimeAsFileTime
GetPrivateProfileStringW
ReadConsoleW
GetSystemWow64DirectoryA
QueryActCtxW
CreateActCtxW
ActivateActCtx
GlobalAlloc
GlobalFindAtomA
LoadLibraryW
GetConsoleMode
ReadConsoleInputA
SizeofResource
GetSystemWindowsDirectoryA
SetConsoleMode
HeapValidate
GetVolumePathNamesForVolumeNameW
IsDBCSLeadByte
GetModuleFileNameW
GetSystemDirectoryA
CompareStringW
GetStartupInfoW
TlsGetValue
GetLastError
SetLastError
GetProcAddress
SetFirmwareEnvironmentVariableW
CreateNamedPipeA
IsValidCodePage
CopyFileA
GlobalGetAtomNameA
SearchPathA
GetPrivateProfileStringA
OpenWaitableTimerA
WritePrivateProfileStringA
WTSGetActiveConsoleSessionId
SetConsoleCursorInfo
GetProcessShutdownParameters
BuildCommDCBA
GetCurrentDirectoryA
GetFileTime
GetVersionExA
GetWindowsDirectoryW
FileTimeToLocalFileTime
TlsFree
GetProfileSectionW
CommConfigDialogW
LocalFileTimeToFileTime
GetConsoleAliasesLengthW
VerifyVersionInfoW
DeleteFileA
GetCommandLineA
HeapSetInformation
EnterCriticalSection
LeaveCriticalSection
DecodePointer
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EncodePointer
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
InterlockedIncrement
ExitProcess
GetModuleFileNameA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
IsBadReadPtr
TlsAlloc
TlsSetValue
HeapCreate
WriteFile
GetACP
GetOEMCP
GetCPInfo
OutputDebugStringA
WriteConsoleW
OutputDebugStringW
RtlUnwind
SetFilePointer
GetConsoleCP
HeapAlloc
HeapReAlloc
HeapSize
HeapQueryInformation
HeapFree
FlushFileBuffers
GetStringTypeW
LCMapStringW
MultiByteToWideChar
IsProcessorFeaturePresent
SetStdHandle
CloseHandle
CreateFileW
RaiseException
user32
GetMenuInfo
GetMessageTime
GetListBoxInfo
gdi32
GetBitmapBits
Sections
.text Size: 196KB - Virtual size: 196KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 39.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 66KB - Virtual size: 66KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ