C:\wocorivekobol\yukud_reheg.pdb
Static task
static1
Behavioral task
behavioral1
Sample
3eac85459e4de2a6ab0b4703278e728920f4bc1bf2d0ed5454e8f5f02a0a78ab.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3eac85459e4de2a6ab0b4703278e728920f4bc1bf2d0ed5454e8f5f02a0a78ab.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_63feb06b82ab8b1e98679b303f91a6231e551fbbf01cc4bc48bfba5980f30d33
-
Size
677KB
-
MD5
4405120ee64bd755cf9980cf8b3c9749
-
SHA1
02c00aebeb743e5ffbed140e21baf96108f3b6f2
-
SHA256
63feb06b82ab8b1e98679b303f91a6231e551fbbf01cc4bc48bfba5980f30d33
-
SHA512
c422774d16efbd18b0d20c5afddd15d506a11d75b124a4e905b6a34307725ab6d690ae9bded405545ea23fab6977db7c3f3cfabe97574c5bad5a0a636d6a7a25
-
SSDEEP
12288:Iw/mYGp1NimFQ/f/Fkhj6ofKfcT1mZG2eD5ppt5d0lwLuE:ISmYGp1NimFQ/f+16cCckZG/VrKlwLuE
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/3eac85459e4de2a6ab0b4703278e728920f4bc1bf2d0ed5454e8f5f02a0a78ab
Files
-
JaffaCakes118_63feb06b82ab8b1e98679b303f91a6231e551fbbf01cc4bc48bfba5980f30d33.zip
-
3eac85459e4de2a6ab0b4703278e728920f4bc1bf2d0ed5454e8f5f02a0a78ab.exe windows:5 windows x86 arch:x86
8e49cd737c177fb9961f518322505e61
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
VerifyVersionInfoA
VerifyVersionInfoW
WriteConsoleInputA
EnumDateFormatsW
FindNextFileW
CopyFileExA
DnsHostnameToComputerNameW
ReadConsoleOutputCharacterW
SetConsoleActiveScreenBuffer
LockFile
GetProfileSectionA
QueryDosDeviceW
RequestWakeupLatency
GetProcessPriorityBoost
GetDriveTypeW
GlobalGetAtomNameA
DeleteFileA
FindNextVolumeMountPointW
TlsGetValue
SizeofResource
WriteConsoleInputW
GetConsoleTitleW
GetComputerNameExW
OpenEventA
CallNamedPipeA
GetModuleHandleW
GetSystemDirectoryA
GetDriveTypeA
BuildCommDCBAndTimeoutsA
GetProcAddress
GetModuleHandleA
GetShortPathNameA
GetCommandLineW
InterlockedIncrement
InterlockedExchange
CopyFileW
CreateActCtxW
FormatMessageW
EnterCriticalSection
FindNextVolumeW
CreateIoCompletionPort
LoadLibraryA
CreateNamedPipeW
GetSystemDefaultLangID
GetConsoleAliasesLengthA
WriteProfileSectionW
AddAtomW
InterlockedDecrement
HeapFree
_hwrite
InterlockedCompareExchange
GetStartupInfoW
CreateMailslotW
GetCPInfoExW
GetSystemWow64DirectoryW
GetLastError
GetPrivateProfileIntW
GetConsoleAliasExesLengthW
DebugBreak
SetLastError
LoadLibraryW
FindNextFileA
VirtualAlloc
GetACP
lstrcpyA
GetConsoleAliasA
GetDiskFreeSpaceExA
TerminateProcess
EnumResourceLanguagesA
SetConsoleTextAttribute
GlobalGetAtomNameW
CreateJobSet
MoveFileW
lstrcpynA
EnumSystemLocalesA
GetPrivateProfileSectionNamesW
GetFileAttributesW
FileTimeToSystemTime
CopyFileA
GetTapeParameters
lstrcmpW
SetEvent
MoveFileA
CreateMutexA
FindResourceW
GetCommState
FormatMessageA
CreateFiber
GetConsoleFontSize
LocalAlloc
SetFileShortNameA
lstrcpyW
HeapLock
GetFileAttributesA
SetCalendarInfoW
GetSystemWindowsDirectoryW
GetConsoleAliasesW
EnumDateFormatsExW
GetComputerNameW
GetPrivateProfileStructW
_hread
LocalFlags
OpenWaitableTimerA
EnumResourceNamesW
CreateFileMappingW
SetProcessShutdownParameters
lstrcpynW
WriteConsoleW
FreeUserPhysicalPages
WriteConsoleOutputCharacterW
OpenJobObjectW
CreateFileW
SetCurrentDirectoryA
GlobalWire
GetFileInformationByHandle
GetProfileSectionW
CommConfigDialogW
CreateFileA
GetDefaultCommConfigA
LocalFree
Sleep
InitializeCriticalSection
DeleteCriticalSection
LeaveCriticalSection
RaiseException
RtlUnwind
WideCharToMultiByte
GetCommandLineA
GetStartupInfoA
HeapValidate
IsBadReadPtr
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetModuleFileNameW
GetCurrentProcess
IsDebuggerPresent
TlsAlloc
TlsSetValue
GetCurrentThreadId
TlsFree
GetOEMCP
GetCPInfo
IsValidCodePage
SetFilePointer
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
ExitProcess
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
HeapDestroy
HeapCreate
VirtualFree
WriteFile
HeapAlloc
HeapSize
HeapReAlloc
FlushFileBuffers
GetConsoleCP
GetConsoleMode
OutputDebugStringA
OutputDebugStringW
InitializeCriticalSectionAndSpinCount
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
CloseHandle
user32
CharToOemBuffW
CharUpperA
GetMessageTime
LoadMenuA
advapi32
AbortSystemShutdownW
Sections
.text Size: 198KB - Virtual size: 197KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 586KB - Virtual size: 622KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vukipiv Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.kozoca Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ketoreb Size: 512B - Virtual size: 150B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 26KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ