C:\har_nowu_vajonafipol_sidahafow.pdb
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_392f7ce030ab889583e63eca5b2c6bcc9bb846b945f89876fdbc772f193e3a29.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_392f7ce030ab889583e63eca5b2c6bcc9bb846b945f89876fdbc772f193e3a29.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_392f7ce030ab889583e63eca5b2c6bcc9bb846b945f89876fdbc772f193e3a29
-
Size
794KB
-
MD5
004c25b803ca4778d78a42880cb3946a
-
SHA1
1c9fe4ee956952b508faf794526ebf553af4da2f
-
SHA256
392f7ce030ab889583e63eca5b2c6bcc9bb846b945f89876fdbc772f193e3a29
-
SHA512
bcde735381b8b8b97cdeb463151d5d4a440dbe0d248001b9f9d577a24f57aadb2170aef93464d47ad8ac30778d7ae81192599314f47ab38a0bb223d29f150e2b
-
SSDEEP
12288:rC5/849S8RhH2irOK23GQxq0FI3NNi3RD7k5HEtPkfjxxwCGX0VzVNVoBCG8VsnG:6z9SHmkqUI9Y3Zk5sPkfTwLXiUClVR
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource JaffaCakes118_392f7ce030ab889583e63eca5b2c6bcc9bb846b945f89876fdbc772f193e3a29
Files
-
JaffaCakes118_392f7ce030ab889583e63eca5b2c6bcc9bb846b945f89876fdbc772f193e3a29.exe windows:5 windows x86 arch:x86
28bd666374957ad640bfcdff27cdedf7
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetFileSize
lstrcmpA
WriteConsoleInputW
TryEnterCriticalSection
WritePrivateProfileStructA
GetConsoleAliasesLengthW
CopyFileExW
SetComputerNameExA
GetDriveTypeW
lstrcpynA
GetConsoleAliasExesLengthA
FindResourceW
BuildCommDCBAndTimeoutsA
LoadResource
UpdateResourceA
InterlockedIncrement
_lwrite
GetQueuedCompletionStatus
VerSetConditionMask
MoveFileExW
ReadConsoleA
InterlockedDecrement
ZombifyActCtx
WritePrivateProfileSectionA
SetDefaultCommConfigW
GetSystemWindowsDirectoryW
GetNamedPipeHandleStateA
GetProfileSectionA
SetConsoleScreenBufferSize
InterlockedCompareExchange
WriteConsoleInputA
GetComputerNameW
ConnectNamedPipe
GetModuleHandleW
GetTickCount
VirtualFree
GetConsoleAliasesLengthA
GetDllDirectoryW
GetPrivateProfileStringW
GetConsoleTitleA
ReadConsoleOutputA
GetConsoleAliasExesW
GetDateFormatA
GetCommandLineA
CreateActCtxW
EnumResourceTypesA
SetProcessPriorityBoost
GetDriveTypeA
GetPriorityClass
GetVolumePathNameW
GlobalAlloc
GetPrivateProfileIntA
GetSystemDirectoryW
SetFileShortNameW
LoadLibraryW
IsProcessInJob
CopyFileW
AssignProcessToJobObject
GetCalendarInfoW
ReadProcessMemory
GetSystemWow64DirectoryW
GetSystemWindowsDirectoryA
FormatMessageW
GetSystemTimeAdjustment
GetVersionExW
GetFileAttributesA
SetConsoleMode
GetConsoleAliasW
GetWriteWatch
VerifyVersionInfoA
WriteConsoleW
GetBinaryTypeA
TerminateProcess
GetAtomNameW
GetMailslotInfo
GetCompressedFileSizeA
GetTimeZoneInformation
CreateFileW
lstrcatA
GetOverlappedResult
GetACP
lstrlenW
FindNextVolumeMountPointW
CreateMailslotW
DeactivateActCtx
GetNamedPipeHandleStateW
GetConsoleAliasesW
ReleaseActCtx
SetCurrentDirectoryA
GetStartupInfoA
GetCPInfoExW
FillConsoleOutputCharacterW
GetHandleInformation
GetLastError
GetLongPathNameW
ReadConsoleOutputCharacterA
CreateNamedPipeA
EnumDateFormatsExA
CreateTimerQueueTimer
WriteProfileSectionA
SetComputerNameA
VerLanguageNameW
GlobalGetAtomNameA
DefineDosDeviceA
ResetEvent
OpenWaitableTimerA
GetLocalTime
LoadLibraryA
UnhandledExceptionFilter
InterlockedExchangeAdd
SetCalendarInfoW
WritePrivateProfileStringA
MoveFileA
SetConsoleOutputCP
GetExitCodeThread
AddAtomW
GetProfileStringA
VirtualLock
HeapLock
GetCommMask
HeapWalk
GetTapeParameters
FoldStringW
SetSystemTime
GlobalWire
GetModuleFileNameA
GetPrivateProfileSectionNamesA
FindNextFileA
EnumDateFormatsA
FindFirstChangeNotificationA
lstrcatW
FreeEnvironmentStringsW
FindNextFileW
GetStringTypeW
BuildCommDCBA
VirtualProtect
OutputDebugStringA
SetThreadAffinityMask
EndUpdateResourceA
GetVersionExA
GetVersion
DeleteFileW
GetCurrentProcessId
MoveFileWithProgressW
GetFileInformationByHandle
DebugBreak
FindActCtxSectionStringW
SuspendThread
lstrcpyA
SetUnhandledExceptionFilter
WideCharToMultiByte
DeleteFileA
GetStartupInfoW
HeapValidate
IsBadReadPtr
RaiseException
Sleep
GetProcAddress
ExitProcess
WriteFile
GetStdHandle
LeaveCriticalSection
EnterCriticalSection
SetStdHandle
GetFileType
GetConsoleCP
GetConsoleMode
GetCurrentProcess
IsDebuggerPresent
GetModuleFileNameW
GetOEMCP
GetCPInfo
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
GetCurrentThreadId
TlsFree
SetLastError
SetHandleCount
DeleteCriticalSection
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetEnvironmentStringsW
GetCommandLineW
HeapDestroy
HeapCreate
HeapFree
HeapAlloc
HeapSize
HeapReAlloc
VirtualAlloc
InitializeCriticalSectionAndSpinCount
WriteConsoleA
GetConsoleOutputCP
MultiByteToWideChar
SetFilePointer
RtlUnwind
OutputDebugStringW
LCMapStringA
LCMapStringW
GetStringTypeA
GetLocaleInfoA
CreateFileA
CloseHandle
FlushFileBuffers
Sections
.text Size: 164KB - Virtual size: 163KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 586KB - Virtual size: 841KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.letugu Size: 512B - Virtual size: 5B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.faxa Size: 512B - Virtual size: 75B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.hehel Size: 512B - Virtual size: 34B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 42KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ