f:\src\servershell\HiddenLauncher\x86\_bldtmp\retail\WosHiddenLauncher32.pdb
Static task
static1
Behavioral task
behavioral1
Sample
59c2af3a78ce21fb98534a70631a005f_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
59c2af3a78ce21fb98534a70631a005f_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
59c2af3a78ce21fb98534a70631a005f_JaffaCakes118
-
Size
232KB
-
MD5
59c2af3a78ce21fb98534a70631a005f
-
SHA1
203f579b32ea8bd312916d03fd1cf0ded9e00041
-
SHA256
c610fc1c2212345c3131de47be15985eec9bb8fa24f8fd072cc28d7c6fd7e3f6
-
SHA512
9c2e19525b0795bf32a20b4ac4c87fe844b3818b7b377c26ec1b6870f24b1e80cefa891fc8a0f0310e2a852e99840676250b373fc9cdcd03d09544fbbc5e588c
-
SSDEEP
3072:wc7uHqpIX7Z590ZMdHRjTql1XZl+gvfQ9fCLlgf6OV54WoELpMi:8Hqp490E6vvfQBCLlyfVBMi
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 59c2af3a78ce21fb98534a70631a005f_JaffaCakes118
Files
-
59c2af3a78ce21fb98534a70631a005f_JaffaCakes118.exe windows:4 windows x86 arch:x86
8abbafb1f3ceda7b3cc63508d1bd72e2
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
InterlockedDecrement
OutputDebugStringW
IsDebuggerPresent
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
InterlockedIncrement
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
SetUnhandledExceptionFilter
GetStartupInfoW
InterlockedCompareExchange
InterlockedExchange
CreateFileMappingW
MapViewOfFile
GetVersionExW
Sleep
CreateProcessW
GetLastError
GetSystemTimeAsFileTime
CloseHandle
user32
EndDialog
CreateWindowExW
TranslateMessage
LoadStringW
LoadAcceleratorsW
FindWindowW
SendMessageW
PostMessageW
GetMessageW
TranslateAcceleratorW
DispatchMessageW
LoadIconW
LoadCursorW
RegisterClassExW
DefWindowProcW
DestroyWindow
DialogBoxParamW
BeginPaint
EndPaint
PostQuitMessage
advapi32
SetSecurityDescriptorDacl
InitializeAcl
GetLengthSid
AllocateAndInitializeSid
InitializeSecurityDescriptor
FreeSid
AddAccessAllowedAce
shell32
ShellExecuteW
ole32
CoInitializeEx
CoInitialize
msvcr80
_lock
__dllonexit
_decode_pointer
?terminate@@YAXXZ
_except_handler4_common
_invoke_watson
_controlfp_s
_crt_debugger_hook
_onexit
_unlock
__set_app_type
_encode_pointer
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_configthreadlocale
_initterm_e
wcschr
wcsstr
_vswprintf
_vsnwprintf_s
memset
wcslen
printf
_amsg_exit
__wgetmainargs
_cexit
_exit
_XcptFilter
exit
_wcmdln
_initterm
Exports
Exports
TracePrintf
WOSTraceCounterDecrement
WOSTraceCounterGet
WOSTraceCounterIncrement
WOSTraceCounterReset
WOSTraceCounterSet
WOSTraceGetSessionId
WOSTraceSetSessionId
Sections
.text Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 52KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
PACK Size: 160KB - Virtual size: 416KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE