C:\veluxibahupali\wikiz\66.pdb
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_081105bb991adce12b34aa07cb346f3f.exe
Resource
win7-20240729-en
General
-
Target
JaffaCakes118_081105bb991adce12b34aa07cb346f3f
-
Size
310KB
-
MD5
081105bb991adce12b34aa07cb346f3f
-
SHA1
ddc840c6bb3f4c0885300881b4e96758ce0239ef
-
SHA256
b8473f3353f532ea9867c60d794f39ad0f3438aa1aefd2fb2bfa35f8472263ca
-
SHA512
96cb42dfb04818d0209b52b0cb593c5a4cff843832f2ac5295ec86f303dcb2c94285f79eb7d3d7301fd333908be29b9a7c01eded724f665fdf5be461f72f0dc9
-
SSDEEP
6144:00W8qw2qB/hqg6gvX4MlvEuIqm/riU42MJVx98aC3dR+:tvqzqlhv7EuI9z4H8ndR+
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource JaffaCakes118_081105bb991adce12b34aa07cb346f3f
Files
-
JaffaCakes118_081105bb991adce12b34aa07cb346f3f.exe windows:5 windows x86 arch:x86
bb55b92d760b78258bb8b3d9f303c687
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
UnmapViewOfFile
HeapAlloc
GetCurrentProcess
GetEnvironmentStringsW
SleepEx
ReadConsoleW
CreateActCtxW
InitAtomTable
HeapDestroy
FindNextVolumeW
WriteConsoleW
GetModuleFileNameW
GetOverlappedResult
GetACP
ReleaseSemaphore
DeactivateActCtx
SetLastError
GetProcAddress
ResetEvent
GetAtomNameA
LocalAlloc
GetModuleHandleA
GetProcessShutdownParameters
EraseTape
GetProcessAffinityMask
VirtualProtect
EndUpdateResourceA
LCMapStringW
lstrcpyA
EncodePointer
DecodePointer
GetCommandLineW
HeapSetInformation
GetStartupInfoW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
GetModuleHandleW
GetCurrentThreadId
GetLastError
InterlockedDecrement
EnterCriticalSection
LeaveCriticalSection
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
HeapFree
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
SetFilePointer
CloseHandle
ExitProcess
WriteFile
FreeEnvironmentStringsW
HeapCreate
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetCPInfo
GetOEMCP
IsValidCodePage
Sleep
WideCharToMultiByte
RtlUnwind
SetStdHandle
GetConsoleCP
GetConsoleMode
FlushFileBuffers
LoadLibraryW
RaiseException
MultiByteToWideChar
GetStringTypeW
HeapReAlloc
IsProcessorFeaturePresent
HeapSize
CreateFileW
Sections
.text Size: 187KB - Virtual size: 186KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 445KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bahaz Size: 1024B - Virtual size: 624B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.damiw Size: 512B - Virtual size: 23B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 95KB - Virtual size: 95KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ