C:\zulabag.pdb
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_3566557df83506670d9589b709f71cbd.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
JaffaCakes118_3566557df83506670d9589b709f71cbd.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_3566557df83506670d9589b709f71cbd
-
Size
12.9MB
-
MD5
3566557df83506670d9589b709f71cbd
-
SHA1
e89af9bfe94a96b256f8559bf3b9fbcf32606ccd
-
SHA256
902c64f8f0ca0373d745468bb8941d492e0aa734f0c081088b4dd0ab153097d7
-
SHA512
0c8e955713344770a0f464823368931261b59c876d02e838259889f7354730248934b301f4d4ca320d1c18e5aaabd03b4af3cb0b323622058bbef0c395961c71
-
SSDEEP
393216:QppppppppppppppppppppppppppppppppppppppppppppppppppppppppppppppX:
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource JaffaCakes118_3566557df83506670d9589b709f71cbd
Files
-
JaffaCakes118_3566557df83506670d9589b709f71cbd.exe windows:5 windows x86 arch:x86
239d0543c3c8f22bd3bf2a0ca25ae8f0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetComputerNameA
EnumResourceNamesW
SearchPathW
WriteConsoleInputW
CopyFileExW
TlsGetValue
SetEndOfFile
FindResourceExW
MapUserPhysicalPages
LoadResource
InterlockedIncrement
ScrollConsoleScreenBufferW
CreateDirectoryW
GlobalLock
GetCommProperties
FreeEnvironmentStringsA
SetTapeParameters
GetModuleHandleW
CreateNamedPipeW
LocalFlags
GetConsoleAliasesLengthA
GetPrivateProfileStringW
GetWindowsDirectoryA
WriteFile
SetCommState
GetCommandLineA
GetSystemWow64DirectoryA
WriteFileGather
CreateDirectoryExW
SetProcessPriorityBoost
InitializeCriticalSection
GlobalAlloc
LoadLibraryW
GetConsoleMode
GetCalendarInfoA
SetSystemTimeAdjustment
GetSystemWindowsDirectoryA
TerminateProcess
IsDBCSLeadByte
GetBinaryTypeW
GetOverlappedResult
CompareStringW
lstrlenW
LCMapStringA
GetConsoleOutputCP
VerifyVersionInfoW
InterlockedExchange
ReleaseActCtx
GetFileSizeEx
SetThreadLocale
FindFirstFileA
OpenMutexW
GetCurrentDirectoryW
GetProcAddress
SetVolumeLabelW
WriteProfileSectionA
SetComputerNameA
SearchPathA
BuildCommDCBW
GetLocalTime
OpenMutexA
OpenWaitableTimerW
GetConsoleScreenBufferInfo
SetConsoleCtrlHandler
AddAtomW
FindAtomA
EnumResourceTypesW
SetConsoleCursorInfo
CreateIoCompletionPort
SetConsoleTitleW
FindNextFileW
GetConsoleTitleW
RequestWakeupLatency
GetConsoleCursorInfo
GetVersionExA
DeleteFileW
InterlockedPushEntrySList
GetProfileSectionW
AreFileApisANSI
GetVolumeInformationW
GetModuleHandleA
FlushFileBuffers
GetStartupInfoA
HeapValidate
IsBadReadPtr
RaiseException
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetModuleFileNameW
SetUnhandledExceptionFilter
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
Sleep
InterlockedDecrement
ExitProcess
GetModuleFileNameA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetLastError
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
TlsAlloc
TlsSetValue
TlsFree
SetLastError
HeapDestroy
HeapCreate
HeapFree
VirtualFree
HeapAlloc
GetCurrentProcess
UnhandledExceptionFilter
IsDebuggerPresent
HeapSize
HeapReAlloc
VirtualAlloc
GetACP
GetOEMCP
GetCPInfo
IsValidCodePage
RtlUnwind
InitializeCriticalSectionAndSpinCount
DebugBreak
OutputDebugStringA
WriteConsoleW
OutputDebugStringW
LoadLibraryA
MultiByteToWideChar
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
SetFilePointer
GetConsoleCP
SetStdHandle
WriteConsoleA
CreateFileA
CloseHandle
user32
GetMenuCheckMarkDimensions
GetMessageTime
GetMenuInfo
Sections
.text Size: 201KB - Virtual size: 201KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 46KB - Virtual size: 45KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 4.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 67KB - Virtual size: 66KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 12.6MB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ