e:\haozip4.0\rczip\build_temp\Win32\compile\Release\HaoZipMd5\HaoZipMd5.pdb
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_079c905a15e2b298242f664188a9ca90.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_079c905a15e2b298242f664188a9ca90.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_079c905a15e2b298242f664188a9ca90
-
Size
140KB
-
MD5
079c905a15e2b298242f664188a9ca90
-
SHA1
76aabd536f919cbb302dd7f7d357fbabd2bfc4c2
-
SHA256
0139460065984085870908893a2ae80d4d93edc3bb575add4e979db5e5bdcfa3
-
SHA512
1dc3049435f3e92602bba513e93b35901a9c81394f71ec1028addb814857ebab8308380fc520f4caf44054322912d5aa825474f6b337da5accd070d7bd342c79
-
SSDEEP
3072:WGMM3FA12NuE/OjTqKJudwotUF+Dn3zwNhjMNyZZdd63iq+:f73W9E/OjTmwofXwNYgIl+
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource JaffaCakes118_079c905a15e2b298242f664188a9ca90
Files
-
JaffaCakes118_079c905a15e2b298242f664188a9ca90.exe windows:4 windows x86 arch:x86
1fe332c3e902ad97027f3cb4769c641d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetModuleHandleW
ExpandEnvironmentStringsW
GetCurrentProcess
GetVersionExW
GetProcAddress
LoadLibraryW
FreeLibrary
GetFileAttributesW
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
LeaveCriticalSection
CreateFileW
FindFirstFileW
FindClose
GetModuleFileNameW
GetCurrentDirectoryW
GetFullPathNameW
lstrlenW
ReadFile
SetFilePointer
InterlockedExchange
Sleep
GetComputerNameW
LoadLibraryA
GetFileSizeEx
GetACP
InterlockedCompareExchange
GetStartupInfoW
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
CloseHandle
user32
LoadIconW
GetDesktopWindow
advapi32
GetUserNameW
shell32
SHGetPathFromIDListW
SHGetSpecialFolderLocation
ole32
OleInitialize
CoTaskMemFree
OleUninitialize
msvcr80
_wcsicmp
wcsncpy
_controlfp_s
memset
wcsrchr
_invoke_watson
_except_handler4_common
?_type_info_dtor_internal_method@type_info@@QAEXXZ
?terminate@@YAXXZ
_crt_debugger_hook
_decode_pointer
_onexit
memcpy
_lock
__dllonexit
_unlock
__set_app_type
??0exception@std@@QAE@ABV01@@Z
??0exception@std@@QAE@ABQBD@Z
??1exception@std@@UAE@XZ
??3@YAXPAX@Z
?what@exception@std@@UBEPBDXZ
strlen
??0exception@std@@QAE@XZ
memcpy_s
??2@YAPAXI@Z
memmove_s
??_V@YAXPAX@Z
_invalid_parameter_noinfo
wcsstr
wcschr
_CxxThrowException
__CxxFrameHandler3
_amsg_exit
__wgetmainargs
_cexit
_exit
_XcptFilter
exit
_wcmdln
_initterm
_initterm_e
_configthreadlocale
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
_encode_pointer
Sections
.text Size: 25KB - Virtual size: 24KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.5rdata Size: 68KB - Virtual size: 68KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE