C:\nikanivilutoj.pdb
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_84cb0a7a8906d09895f74d59950cf353.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
JaffaCakes118_84cb0a7a8906d09895f74d59950cf353.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_84cb0a7a8906d09895f74d59950cf353
-
Size
287KB
-
MD5
84cb0a7a8906d09895f74d59950cf353
-
SHA1
8007fe05481049da7c8d1174c4c6896ea03c9c28
-
SHA256
8a4d537fe2f4024f45528827497f246b85a568ee6c5b3799736dc4b1d754c87b
-
SHA512
643fe18d51278b9dae1ffbb4d6e93b0078c0c787aac1ff9994f2eb9f465e5c4a1047863dc79eff1879e544ec1232a79802a4eb05890b8ef019743c648b5f9e22
-
SSDEEP
6144:X74paROBGiovQXL2X2rYIlMNjgVx98aC3QD:r8akX5bbH8n
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource JaffaCakes118_84cb0a7a8906d09895f74d59950cf353
Files
-
JaffaCakes118_84cb0a7a8906d09895f74d59950cf353.exe windows:5 windows x86 arch:x86
9a761cc30337d6ef5b44d15f62f53af5
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
HeapReAlloc
UnmapViewOfFile
GetCurrentProcess
SleepEx
ReadConsoleW
GetEnvironmentStrings
InitAtomTable
HeapDestroy
FindNextVolumeW
WriteConsoleW
GetModuleFileNameW
CreateActCtxA
GetOverlappedResult
GetACP
ReleaseSemaphore
DeactivateActCtx
SetLastError
GetProcAddress
ResetEvent
GetAtomNameA
LocalAlloc
GetModuleHandleA
GetProcessShutdownParameters
EraseTape
VirtualProtect
EndUpdateResourceA
LCMapStringW
lstrcpyA
EncodePointer
DecodePointer
GetCommandLineW
HeapSetInformation
GetStartupInfoW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
GetModuleHandleW
GetCurrentThreadId
GetLastError
InterlockedDecrement
HeapAlloc
EnterCriticalSection
LeaveCriticalSection
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
HeapFree
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
SetFilePointer
CloseHandle
ExitProcess
WriteFile
FreeEnvironmentStringsW
GetEnvironmentStringsW
HeapCreate
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetCPInfo
GetOEMCP
IsValidCodePage
Sleep
WideCharToMultiByte
RtlUnwind
SetStdHandle
GetConsoleCP
GetConsoleMode
FlushFileBuffers
LoadLibraryW
RaiseException
MultiByteToWideChar
GetStringTypeW
IsProcessorFeaturePresent
HeapSize
CreateFileW
Sections
.text Size: 158KB - Virtual size: 158KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 445KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tujobep Size: 1024B - Virtual size: 624B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.lodifu Size: 512B - Virtual size: 23B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 101KB - Virtual size: 100KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ