c:\DesktopX2\AppLauncher\Release\AppLauncher.pdb
Static task
static1
Behavioral task
behavioral1
Sample
6028a51e595d4e4783c8d4517ed59dc5_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6028a51e595d4e4783c8d4517ed59dc5_JaffaCakes118.exe
Resource
win10v2004-20240426-en
General
-
Target
6028a51e595d4e4783c8d4517ed59dc5_JaffaCakes118
-
Size
440KB
-
MD5
6028a51e595d4e4783c8d4517ed59dc5
-
SHA1
61c2c6c83f973f60dfc2356306ecf93daf6aa1fc
-
SHA256
4bdc1e8112609af4269cff74fef7b0ea529f13b32c14ed4dbb1cf87e8b1eab39
-
SHA512
eae0d15b3c35b49c9b0da032aaee241fd400823b709ce210607bd1fa19294fb133b978e3afbb1c1d909e767b0b00595f728c7e22316ab2d3cad4cd497698dcf2
-
SSDEEP
12288:LxvMHvXjOBaDIAcoQGSdIUpfXbJo6DlXpyLMuMw:LxvM/S8DIJcSuUxX+6ZvuV
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6028a51e595d4e4783c8d4517ed59dc5_JaffaCakes118
Files
-
6028a51e595d4e4783c8d4517ed59dc5_JaffaCakes118.exe windows:4 windows x86 arch:x86
46f0626d55e162447aac2d5583f1ab40
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
shlwapi
PathRemoveFileSpecA
PathFileExistsA
PathIsDirectoryA
PathStripPathA
kernel32
GetSystemInfo
CloseHandle
SetFileTime
LocalFileTimeToFileTime
DosDateTimeToFileTime
GetFileTime
CreateFileA
lstrlenA
DeleteFileA
WriteFile
LockResource
LoadResource
SizeofResource
FindResourceA
GetTempFileNameA
GetTempPathA
RemoveDirectoryA
FindClose
FindNextFileA
FindFirstFileA
lstrcpyA
Sleep
GetSystemDirectoryA
MoveFileA
CreateDirectoryA
lstrcatA
WideCharToMultiByte
GetModuleFileNameA
VirtualProtect
HeapSize
SetEndOfFile
LCMapStringW
LCMapStringA
GetStringTypeW
MultiByteToWideChar
lstrcmpA
GetCurrentThreadId
GetStringTypeA
GetLocaleInfoA
HeapFree
HeapAlloc
ExitProcess
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersionExA
EnterCriticalSection
LeaveCriticalSection
TlsAlloc
SetLastError
GetLastError
TlsFree
TlsSetValue
TlsGetValue
GetProcAddress
HeapDestroy
HeapCreate
VirtualFree
DeleteCriticalSection
VirtualAlloc
HeapReAlloc
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
ReadFile
SetHandleCount
GetStdHandle
GetFileType
SetFilePointer
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
RtlUnwind
InterlockedExchange
VirtualQuery
GetACP
GetOEMCP
GetCPInfo
InitializeCriticalSection
SetStdHandle
FlushFileBuffers
LoadLibraryA
user32
TranslateMessage
DispatchMessageA
KillTimer
PostQuitMessage
wsprintfA
GetMessageA
SetTimer
advapi32
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
shell32
ShellExecuteExA
ole32
CoCreateGuid
StringFromGUID2
Sections
.text Size: 48KB - Virtual size: 47KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 368KB - Virtual size: 367KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ