C:\ben.pdb
Static task
static1
Behavioral task
behavioral1
Sample
9c995879ba01832f9fabb02012987acec2546f4adb170c253983ef8c7bfc91d5.exe
Resource
win7-20240729-en
General
-
Target
JaffaCakes118_5955f152c661a9643e42ecadfb4585b9e046a9a41ffac4822929500f6ef76a1a
-
Size
245KB
-
MD5
4cb36f914d4ad189acb79cfc76ef0bf8
-
SHA1
42a16435df54f894be969c0208e366f0806232e6
-
SHA256
5955f152c661a9643e42ecadfb4585b9e046a9a41ffac4822929500f6ef76a1a
-
SHA512
4d82f81d51ce4fd83cb80dbbd4ec00b19c9b637d1f4d8efbb5aa349552d86adc34c4375fa2b47c681d12e31406a58b9c0a682536ccadb08d79970ae58dc98f14
-
SSDEEP
6144:lWu3xTcWU98VQ2OHX8OphPCLuiOh1kCFVV8NgvX3Wm:guqWU98VQ2OHtCXekCFDugvHn
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/9c995879ba01832f9fabb02012987acec2546f4adb170c253983ef8c7bfc91d5
Files
-
JaffaCakes118_5955f152c661a9643e42ecadfb4585b9e046a9a41ffac4822929500f6ef76a1a.zip
-
9c995879ba01832f9fabb02012987acec2546f4adb170c253983ef8c7bfc91d5.exe windows:5 windows x86 arch:x86
a87920ab0a1fff1279d41ec67cdc5b4d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
OpenProcess
GetNamedPipeHandleStateA
GetQueuedCompletionStatus
FillConsoleOutputCharacterA
EnumSystemCodePagesW
TerminateProcess
GetVolumeNameForVolumeMountPointA
GetVersionExA
VerifyVersionInfoA
WriteConsoleInputA
EnumDateFormatsA
FindNextFileA
CopyFileExW
BuildCommDCBAndTimeoutsA
VirtualLock
WriteProfileStringW
VerifyVersionInfoW
GetFileInformationByHandle
DeleteFileA
FindNextVolumeMountPointW
TlsGetValue
ResetWriteWatch
GetConsoleTitleW
GetComputerNameExW
GetTimeZoneInformation
GetModuleHandleA
GetSystemDirectoryA
GetDriveTypeW
LoadLibraryA
GetShortPathNameW
ReleaseActCtx
GetProfileSectionW
DeleteFileW
GetCommandLineA
InterlockedIncrement
InterlockedExchangeAdd
CreateActCtxW
FindResourceA
FormatMessageA
GetModuleFileNameA
CreateJobObjectW
InitializeCriticalSection
GetNumberOfConsoleMouseButtons
FindNextVolumeA
CreateNamedPipeW
WritePrivateProfileStringA
GetConsoleAliasesLengthW
WriteProfileSectionW
AddAtomW
InterlockedDecrement
GetVersionExW
HeapFree
_hread
InterlockedCompareExchange
GetStartupInfoW
ConnectNamedPipe
GetCPInfoExW
GetSystemWow64DirectoryW
GetLastError
GetPrivateProfileIntW
GetConsoleAliasExesW
DebugBreak
EndUpdateResourceA
GetTickCount
VirtualQueryEx
DeleteVolumeMountPointA
OpenFileMappingA
GetModuleHandleW
SetDefaultCommConfigA
VirtualAlloc
GetSystemWindowsDirectoryA
GetACP
GetDiskFreeSpaceExA
EnumResourceTypesA
IsProcessInJob
WriteConsoleW
GetProcAddress
lstrcpyA
LoadLibraryW
ReadConsoleOutputW
FoldStringA
SetHandleInformation
WritePrivateProfileSectionA
DeleteCriticalSection
GetFileAttributesA
DeactivateActCtx
CopyFileW
GlobalMemoryStatus
SetTapeParameters
GetDevicePowerState
ResetEvent
LockFile
MoveFileA
DisableThreadLibraryCalls
GetOverlappedResult
SetCommTimeouts
LocalAlloc
SetThreadPriorityBoost
SetFileShortNameW
GetFileAttributesW
SetCalendarInfoA
ConvertFiberToThread
GetConsoleTitleA
SetComputerNameW
GetConsoleAliasesA
SetConsoleOutputCP
MoveFileWithProgressW
GetStdHandle
GetLocalTime
FoldStringW
EnumSystemLocalesW
ActivateActCtx
OpenSemaphoreA
GetModuleHandleExA
AddAtomA
GetFileSize
SetUnhandledExceptionFilter
SetProcessShutdownParameters
lstrcpynW
GlobalUnWire
FillConsoleOutputCharacterW
GetCompressedFileSizeA
ReadConsoleA
FreeUserPhysicalPages
WriteConsoleOutputCharacterW
TerminateJobObject
CreateFileA
SetTimerQueueTimer
GetConsoleAliasesLengthA
SetLastError
UnhandledExceptionFilter
RaiseException
GetStartupInfoA
HeapValidate
IsBadReadPtr
EnterCriticalSection
LeaveCriticalSection
GetModuleFileNameW
GetCurrentProcess
IsDebuggerPresent
CloseHandle
SetStdHandle
GetFileType
WriteFile
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
Sleep
ExitProcess
QueryPerformanceCounter
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
TlsAlloc
TlsSetValue
TlsFree
HeapDestroy
HeapCreate
VirtualFree
HeapAlloc
HeapSize
HeapReAlloc
GetOEMCP
GetCPInfo
IsValidCodePage
RtlUnwind
InitializeCriticalSectionAndSpinCount
OutputDebugStringA
OutputDebugStringW
FlushFileBuffers
WriteConsoleA
GetConsoleOutputCP
MultiByteToWideChar
SetFilePointer
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
ReadFile
Sections
.text Size: 194KB - Virtual size: 194KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 157KB - Virtual size: 6.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gewowas Size: 512B - Virtual size: 5B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.firuko Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.cabahe Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.juwirov Size: 512B - Virtual size: 50B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ