C:\kadimi\zi.pdb
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_59824f33b2473ed4cbd2f876dd08298598a2ae682ce600a524212b2a9397e52d.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_59824f33b2473ed4cbd2f876dd08298598a2ae682ce600a524212b2a9397e52d.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_59824f33b2473ed4cbd2f876dd08298598a2ae682ce600a524212b2a9397e52d
-
Size
327KB
-
MD5
6f1d253c3614753b87aab018fa163871
-
SHA1
903ffbf67398e8ded5dae30767f65bf6958126de
-
SHA256
59824f33b2473ed4cbd2f876dd08298598a2ae682ce600a524212b2a9397e52d
-
SHA512
a46e9e740799991c44d7d707c2770b4b7df756d8833a8a37fc83d6855383cec3e337cd485eee147f7c70ca88f0667f0f81a20cccb593f3e237d7805d2c682188
-
SSDEEP
6144:taBO3imrOouSABnevchIagXe6l2uAzBlHMSWZFq:YG1OouSQqcqaoe6l+BtlW
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource JaffaCakes118_59824f33b2473ed4cbd2f876dd08298598a2ae682ce600a524212b2a9397e52d
Files
-
JaffaCakes118_59824f33b2473ed4cbd2f876dd08298598a2ae682ce600a524212b2a9397e52d.exe windows:5 windows x86 arch:x86
5bc4ccb0258df6774763c4c56aa97e96
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
SetWaitableTimer
SetDllDirectoryW
InterlockedIncrement
_lwrite
ReadConsoleA
SetFirmwareEnvironmentVariableA
GetSystemWindowsDirectoryW
GetNamedPipeHandleStateA
GetComputerNameW
GetTickCount
CreateNamedPipeW
GetProcessHeap
ConvertFiberToThread
GetSystemTimeAsFileTime
GetPrivateProfileStringW
GetWindowsDirectoryA
GetCompressedFileSizeW
GetSystemWow64DirectoryA
CreateActCtxW
TlsSetValue
LoadLibraryW
GetConsoleMode
ReadConsoleInputA
CopyFileW
GetVersionExW
HeapCreate
HeapValidate
GetModuleFileNameW
CompareStringW
GetACP
GetStartupInfoW
VerifyVersionInfoW
FindFirstFileExA
GetHandleInformation
GetLastError
IsDBCSLeadByteEx
GetLongPathNameW
CommConfigDialogA
CopyFileA
GetConsoleDisplayMode
FindClose
GetPrivateProfileStringA
SetFileApisToOEM
ProcessIdToSessionId
LocalAlloc
IsWow64Process
WritePrivateProfileStringA
IsSystemResumeAutomatic
SetCurrentDirectoryW
QueryDosDeviceW
GetVolumePathNamesForVolumeNameA
SetConsoleCursorInfo
GetModuleHandleA
GetProcessShutdownParameters
CreateWaitableTimerW
FreeEnvironmentStringsW
WriteProfileStringW
RequestWakeupLatency
BuildCommDCBA
VirtualProtect
GetSystemRegistryQuota
TlsAlloc
FileTimeToLocalFileTime
CreateWaitableTimerA
CloseHandle
CreateFileW
SetStdHandle
GetConsoleCP
FlushFileBuffers
SetFilePointer
LCMapStringW
OutputDebugStringW
GetConsoleAliasesLengthW
GetDriveTypeW
SetLastError
lstrlenA
InterlockedDecrement
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
EncodePointer
DecodePointer
GetCommandLineA
HeapSetInformation
IsBadReadPtr
RaiseException
RtlUnwind
IsProcessorFeaturePresent
InitializeCriticalSectionAndSpinCount
SetUnhandledExceptionFilter
QueryPerformanceCounter
GetCurrentThreadId
GetCurrentProcessId
GetProcAddress
GetModuleHandleW
ExitProcess
GetModuleFileNameA
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
TlsGetValue
TlsFree
WriteFile
HeapAlloc
HeapReAlloc
HeapSize
HeapQueryInformation
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
IsDebuggerPresent
HeapFree
GetOEMCP
GetCPInfo
IsValidCodePage
GetStringTypeW
MultiByteToWideChar
OutputDebugStringA
WriteConsoleW
user32
GetMenuItemID
GetMenuBarInfo
GetCursorInfo
GetMenuInfo
GetComboBoxInfo
GetCaretBlinkTime
GetMessageTime
GetListBoxInfo
gdi32
GetBitmapBits
advapi32
SetKernelObjectSecurity
Sections
.text Size: 224KB - Virtual size: 224KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 31.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 21KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 74KB - Virtual size: 73KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ