C:\dujimak\kuyoxuliw\karebujodujoce_sugutuzuyafog.pdb
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_dd2834b25829a26134eca7d52e85a3b2a755278615e95f171697d38fd7811212.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_dd2834b25829a26134eca7d52e85a3b2a755278615e95f171697d38fd7811212.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_dd2834b25829a26134eca7d52e85a3b2a755278615e95f171697d38fd7811212
-
Size
292KB
-
MD5
24676b75ae396cd2e4126febb9f1fff4
-
SHA1
c744ac9f1d59a25316f5891c898fbc54c02b8947
-
SHA256
dd2834b25829a26134eca7d52e85a3b2a755278615e95f171697d38fd7811212
-
SHA512
9522a4f38ccec7322868f761f8c28ec12332385ac79991080dd9e593f1b3dc7b9c2ee11bbe49dfd189da081325f3911d4b22cd37e313d1de808a7443febb3996
-
SSDEEP
3072:W/r5cRoyOg9E13LUjMR80A/iFFjC/RndHrTAOvX0Pt6wOdCeX09qT1tv7b/hWHAe:WVgy1UjRuFj+dLTAIat6wvl9qr7O
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource JaffaCakes118_dd2834b25829a26134eca7d52e85a3b2a755278615e95f171697d38fd7811212
Files
-
JaffaCakes118_dd2834b25829a26134eca7d52e85a3b2a755278615e95f171697d38fd7811212.exe windows:5 windows x86 arch:x86
107627bf22552479f556abf4b5634390
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
FindFirstVolumeA
WaitForSingleObject
GetNamedPipeHandleStateW
CreateNamedPipeA
CallNamedPipeA
TerminateThread
FatalExit
GetVersionExW
VerifyVersionInfoA
SetConsoleCP
GetConsoleAliasesLengthA
VerLanguageNameA
FindFirstFileExW
FreeEnvironmentStringsA
GetProcessPriorityBoost
SetVolumeMountPointA
GetLongPathNameW
CopyFileA
TlsSetValue
VerifyVersionInfoW
GetConsoleCursorInfo
TzSpecificLocalTimeToSystemTime
SetProcessShutdownParameters
ReleaseSemaphore
BuildCommDCBAndTimeoutsA
GetProcAddress
GetModuleHandleA
LocalAlloc
SleepEx
MoveFileW
GetCommandLineW
InterlockedDecrement
DeleteFileA
CreateActCtxW
SetFileAttributesW
GetPrivateProfileIntA
GetProcessHeap
GetProcessHeaps
WriteConsoleOutputA
GetStartupInfoA
GetDiskFreeSpaceExA
GetCPInfoExW
GetWindowsDirectoryW
GetSystemWow64DirectoryA
SetLastError
GetProfileStringA
GetCalendarInfoA
GetTickCount
GetStringTypeA
GetSystemTime
DebugBreak
FindFirstFileA
WriteFileGather
ReadFile
GetNumberOfConsoleMouseButtons
lstrcatW
InitializeSListHead
InterlockedExchange
SetCriticalSectionSpinCount
DefineDosDeviceA
WriteConsoleW
InterlockedIncrement
HeapWalk
CreateIoCompletionPort
PeekConsoleInputW
GetNumberFormatA
FindResourceExW
SetLocalTime
GetQueuedCompletionStatus
CreateSemaphoreW
GetThreadLocale
SetFileShortNameA
lstrcpyW
ReplaceFileW
MoveFileExW
GetConsoleCP
GetVolumePathNameA
SetConsoleScreenBufferSize
FreeConsole
GetConsoleAliasExesLengthA
WriteConsoleInputA
LocalShrink
GetCommState
EnumSystemLocalesW
GetNumaProcessorNode
SetMessageWaitingIndicator
ChangeTimerQueueTimer
ResetWriteWatch
RaiseException
OpenSemaphoreW
GetConsoleScreenBufferInfo
ClearCommError
ReleaseActCtx
GetSystemTimeAdjustment
GetComputerNameW
HeapValidate
GetLastError
GetStringTypeW
SetSystemPowerState
VirtualUnlock
SetWaitableTimer
CreateTimerQueue
GetProcessHandleCount
IsBadWritePtr
FatalAppExitA
lstrcpynW
SetNamedPipeHandleState
FillConsoleOutputCharacterW
GetCompressedFileSizeW
FindNextVolumeMountPointW
GetFullPathNameA
WriteProfileStringA
GlobalAddAtomA
LeaveCriticalSection
SetCurrentDirectoryW
OpenMutexA
LockFile
ReadFileEx
CloseHandle
CreateFileW
SetStdHandle
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
EncodePointer
DecodePointer
RtlUnwind
MoveFileA
HeapSetInformation
GetStartupInfoW
IsBadReadPtr
InitializeCriticalSectionAndSpinCount
GetModuleFileNameW
IsProcessorFeaturePresent
TlsAlloc
TlsGetValue
GetCurrentThreadId
TlsFree
GetModuleHandleW
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetACP
GetOEMCP
GetCPInfo
IsValidCodePage
ExitProcess
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
HeapCreate
WriteFile
MultiByteToWideChar
HeapAlloc
GetModuleFileNameA
HeapReAlloc
HeapSize
HeapQueryInformation
HeapFree
OutputDebugStringA
OutputDebugStringW
LoadLibraryW
WideCharToMultiByte
LCMapStringW
SetFilePointer
GetConsoleMode
FlushFileBuffers
user32
OemToCharW
GetAltTabInfoW
Sections
.text Size: 201KB - Virtual size: 200KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 53KB - Virtual size: 558KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 22KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ