C:\rabotikaf7\dawu\podenagaci\jirubipiv.pdb
Static task
static1
Behavioral task
behavioral1
Sample
b3c939ee5e44117c90c0e08346011828b47a8a70b41b568ce0a0bb7678cdd105.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b3c939ee5e44117c90c0e08346011828b47a8a70b41b568ce0a0bb7678cdd105.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_02a99d0a5f6d55ad7511c2b13f5f265e0aeea6da836cb765a96652e30580aabd
-
Size
128KB
-
MD5
3ed1acba8b352554935712d74a1ca2c6
-
SHA1
a5099144139bc83175fc01424e8ca1ae783e16ee
-
SHA256
02a99d0a5f6d55ad7511c2b13f5f265e0aeea6da836cb765a96652e30580aabd
-
SHA512
d6ef78edc9b44d573b342a5aaeedac82ffa52fad820cdb7e344a9cd0704c4a80650b9c548bcf49d16cea09eca440dfb87ea9660e588ce442c4644bbc530170be
-
SSDEEP
3072:D/utPWFodbgZR1/5LIYqQln05lAnxSvUnpmWj9ANV:D/utPWFodSpkVQ6eKUnpuNV
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/b3c939ee5e44117c90c0e08346011828b47a8a70b41b568ce0a0bb7678cdd105
Files
-
JaffaCakes118_02a99d0a5f6d55ad7511c2b13f5f265e0aeea6da836cb765a96652e30580aabd.zip
-
b3c939ee5e44117c90c0e08346011828b47a8a70b41b568ce0a0bb7678cdd105.exe windows:5 windows x86 arch:x86
4cfbd807e4155075766f9f516fa9a7f3
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
FoldStringA
GetSystemTime
GetLocalTime
InterlockedDecrement
GetLocaleInfoW
InterlockedCompareExchange
_hwrite
CancelWaitableTimer
GetSystemDirectoryA
CreateEventW
ReadConsoleA
VerifyVersionInfoA
BuildCommDCBA
GetConsoleAliasExesLengthA
SetSystemTimeAdjustment
PeekConsoleInputA
EnumDateFormatsA
CreateFileW
RegisterWaitForSingleObjectEx
LoadLibraryA
WaitNamedPipeA
GetEnvironmentStrings
FindResourceExA
VirtualProtect
GetFirmwareEnvironmentVariableW
GetModuleFileNameW
BeginUpdateResourceW
EnumCalendarInfoExW
WriteConsoleOutputCharacterA
WriteConsoleA
LoadLibraryW
DeleteFileW
LocalAlloc
GetProcAddress
GetUserDefaultLCID
FindFirstChangeNotificationW
HeapUnlock
GetCalendarInfoW
SetConsoleTitleA
GetBinaryTypeW
GetComputerNameExA
FindNextFileA
OpenJobObjectA
HeapValidate
_lclose
GetComputerNameW
SetFileShortNameW
WriteConsoleOutputCharacterW
TlsSetValue
SetCalendarInfoW
SetComputerNameW
CreateDirectoryExA
DeleteCriticalSection
FindFirstChangeNotificationA
GetVolumePathNameW
GetProcessHandleCount
GetCurrentProcess
GetThreadLocale
GetSystemDefaultLangID
ReadFile
GetStringTypeW
HeapSize
GetDiskFreeSpaceA
RaiseException
RtlUnwind
MultiByteToWideChar
GetCommandLineW
HeapSetInformation
GetStartupInfoW
EncodePointer
HeapAlloc
GetLastError
HeapFree
IsProcessorFeaturePresent
SetFilePointer
EnterCriticalSection
LeaveCriticalSection
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
DecodePointer
TerminateProcess
TlsAlloc
TlsGetValue
TlsFree
InterlockedIncrement
GetModuleHandleW
SetLastError
GetCurrentThreadId
ExitProcess
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
CloseHandle
WriteFile
GetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
HeapCreate
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
SetStdHandle
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
FlushFileBuffers
Sleep
LCMapStringW
WriteConsoleW
HeapReAlloc
user32
ClientToScreen
Sections
.text Size: 139KB - Virtual size: 139KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 32.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 30KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ