C:\reguzugox\vipiriyujupuma neyimagotogok4\gubusimemib91\xi.pdb
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_24f6cb235b15df660607faf6729b9d96.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_24f6cb235b15df660607faf6729b9d96.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_24f6cb235b15df660607faf6729b9d96
-
Size
10.4MB
-
MD5
24f6cb235b15df660607faf6729b9d96
-
SHA1
f8c74f532e72f57cd969e7e7bad3b179c7ca5471
-
SHA256
f16c72dc0ac6ba541bd6f2ecbdeb8633d6468bac2c9a3aa98a320425e11fa7e5
-
SHA512
c5a8e428f57983f9c7537916dd3a72670473317a1a89ed2837a363400e7d89cfc80d2e230b71f17ac15a3cb74f1bd0807f2ca9ffd48c0378318229efbb943576
-
SSDEEP
6144:ibxssrIoKMqRI49tDA498xxAoMlmC6Yvbacc1B:6O/MqRIUDA498vEN6YTp
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource JaffaCakes118_24f6cb235b15df660607faf6729b9d96
Files
-
JaffaCakes118_24f6cb235b15df660607faf6729b9d96.exe windows:5 windows x86 arch:x86
7030f4041c0a62b2d716c4db71d85c11
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
FileTimeToDosDateTime
HeapReAlloc
GetNativeSystemInfo
CopyFileExW
TlsGetValue
GetStringTypeA
CallNamedPipeA
InterlockedIncrement
GetCommState
ReadConsoleA
GetNamedPipeHandleStateA
CreateDirectoryW
GlobalLock
SetHandleInformation
GetProfileStringW
GetProfileSectionA
CancelWaitableTimer
FreeEnvironmentStringsA
GetPrivateProfileStringW
GetCommandLineA
GlobalAlloc
LoadLibraryW
TerminateThread
GetSystemWindowsDirectoryA
VerifyVersionInfoA
EnumResourceLanguagesA
IsDBCSLeadByte
GetCompressedFileSizeA
GetSystemDirectoryA
lstrlenW
SetThreadPriority
GetStartupInfoW
WritePrivateProfileStringW
GetPrivateProfileIntW
InterlockedExchange
GetStartupInfoA
GetStdHandle
GetCPInfoExW
GetLastError
GetThreadLocale
GetProcAddress
EnterCriticalSection
CreateMemoryResourceNotification
DisableThreadLibraryCalls
LoadLibraryA
FindAtomA
SetSystemTime
GetOEMCP
Process32NextW
FindNextFileA
WriteProfileStringA
GetModuleHandleA
FreeEnvironmentStringsW
GetCurrentDirectoryA
GetCurrentThreadId
LocalSize
UnregisterWaitEx
LCMapStringW
CopyFileExA
GetVolumeInformationW
HeapValidate
IsBadReadPtr
RaiseException
LeaveCriticalSection
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetModuleFileNameW
InterlockedDecrement
RtlUnwind
GetACP
GetCPInfo
IsValidCodePage
GetModuleHandleW
TlsAlloc
TlsSetValue
TlsFree
SetLastError
DeleteCriticalSection
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
Sleep
ExitProcess
GetModuleFileNameA
GetEnvironmentStrings
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapDestroy
HeapCreate
HeapFree
VirtualFree
WriteFile
HeapAlloc
HeapSize
VirtualAlloc
DebugBreak
OutputDebugStringA
WriteConsoleW
OutputDebugStringW
MultiByteToWideChar
GetStringTypeW
GetLocaleInfoA
LCMapStringA
InitializeCriticalSectionAndSpinCount
FlushFileBuffers
GetConsoleCP
GetConsoleMode
SetFilePointer
CloseHandle
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
CreateFileA
winhttp
WinHttpWriteData
Sections
.text Size: 117KB - Virtual size: 117KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 34KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 68KB - Virtual size: 123KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 64KB - Virtual size: 64KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 10.2MB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ