wmlaunch.pdb
Static task
static1
Behavioral task
behavioral1
Sample
1944330218b4d63615764f2db871f722_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
1944330218b4d63615764f2db871f722_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
1944330218b4d63615764f2db871f722_JaffaCakes118
-
Size
140KB
-
MD5
1944330218b4d63615764f2db871f722
-
SHA1
728a5ac427d2cc4f1861ef2d460286986e4a5ae7
-
SHA256
41e80067392e3cac89c5ed80ba3fe991bce1209971895808ef7b7f4b71c63a2d
-
SHA512
9e3cce5d821e1dcef5d254f434efea3bcd6decaf417e1fbb286b4085f230706ea56991b0bd56557afbfed4ec8429bddca466617e857bf70794654a063050541a
-
SSDEEP
3072:fTr7sodAinGLJaQyC7t07u3kfPPiGsMifb3P2oybjx1ca:TAiQCC7tYu0fPqGsMifLnIj4
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1944330218b4d63615764f2db871f722_JaffaCakes118
Files
-
1944330218b4d63615764f2db871f722_JaffaCakes118.exe windows:5 windows x86 arch:x86
5856f22471de4a1a80f3e8a7c649696f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
SetUnhandledExceptionFilter
GetCurrentThreadId
GetLocalTime
GlobalMemoryStatus
GetDiskFreeSpaceA
GetEnvironmentStringsW
UnhandledExceptionFilter
FreeEnvironmentStringsW
FreeEnvironmentStringsA
HeapSize
LoadLibraryA
GetSystemTimeAsFileTime
GetCurrentProcess
GetTickCount
TerminateProcess
QueryPerformanceCounter
SetEvent
GetModuleFileNameW
LoadLibraryExW
FindResourceW
LoadResource
SizeofResource
lstrlenA
FreeLibrary
lstrcatW
CreateEventW
WaitForSingleObject
lstrcpynW
CloseHandle
HeapDestroy
lstrcmpiW
GetCurrentProcessId
InterlockedDecrement
InterlockedIncrement
DeleteCriticalSection
InitializeCriticalSection
lstrlenW
MultiByteToWideChar
VirtualQuery
GetSystemInfo
VirtualAlloc
VirtualProtect
GetVersionExW
GetEnvironmentStrings
GetProcessHeap
HeapAlloc
HeapFree
GetModuleHandleW
GetVersionExA
GetFileAttributesW
GetExitCodeThread
SetLastError
LeaveCriticalSection
EnterCriticalSection
GetWindowsDirectoryW
SetErrorMode
QueryDosDeviceW
GetVersion
CreateFileA
GetStartupInfoW
CompareStringW
WideCharToMultiByte
GetProcAddress
LoadLibraryW
GetDriveTypeW
CreateFileW
DeviceIoControl
GetLastError
msvcrt
malloc
free
??3@YAXPAX@Z
realloc
??2@YAPAXI@Z
_purecall
_onexit
__dllonexit
_controlfp
__set_app_type
__p__fmode
_beginthreadex
_wcsicmp
wcscmp
iswdigit
_wtoi
wcslen
_vsnwprintf
_wtol
_wcsnicmp
wcsncmp
wcsrchr
wcsstr
wcschr
wcspbrk
iswspace
memmove
towupper
_c_exit
_exit
_XcptFilter
_cexit
exit
_wcmdln
__wgetmainargs
_initterm
__setusermatherr
_adjust_fdiv
_except_handler3
_CIpow
wcsncpy
__p__commode
_snwprintf
advapi32
RegSetValueExA
RegEnumKeyExW
RegEnumValueW
RegQueryInfoKeyW
RegSetValueExW
RegOpenKeyExW
RegCreateKeyExW
RegCloseKey
RegDeleteValueW
RegDeleteKeyW
RegQueryValueExA
RegQueryValueExW
RegCreateKeyExA
user32
CharNextW
CharPrevW
CharNextA
mpr
WNetAddConnection2W
WNetCancelConnection2W
WNetGetConnectionW
ole32
CoCreateInstance
CoTaskMemFree
CoInitializeEx
CoUninitialize
CoTaskMemAlloc
CoRevokeClassObject
CoRegisterClassObject
CoTaskMemRealloc
oleaut32
SysFreeString
VarUI4FromStr
SysAllocStringLen
SysAllocString
SysStringLen
shell32
ShellExecuteExW
shlwapi
PathGetCharTypeW
PathGetCharTypeA
Sections
.text Size: 100KB - Virtual size: 96KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 12KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 92KB - Virtual size: 120KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
kydlduq Size: 24KB - Virtual size: 72KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE