d:\Work\LuncherUpdater\Release\LuncherUpdater.pdb
Static task
static1
Behavioral task
behavioral1
Sample
64a406348725c9474c74dd8f5c0e6c07_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
64a406348725c9474c74dd8f5c0e6c07_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
64a406348725c9474c74dd8f5c0e6c07_JaffaCakes118
-
Size
77KB
-
MD5
64a406348725c9474c74dd8f5c0e6c07
-
SHA1
1dcc3929978b43b106347561e3332b102686a6f5
-
SHA256
183bbea7672a077f11ca1336a6e7474b1982818d20c59077c6d0038f5242ecc8
-
SHA512
c3601856ae952ef97849c5c38a91b1c1dac294137fdcd82b4030343adbf8974cfc54f6334fc96bf845f846de0efc9886cb804aa716d16605bf8b7d21d4dfa8a5
-
SSDEEP
384:X2l4QqSPz6cXVdUsOVVsuqgtpIB5wYi17RkbcrlIIsccCPNiFYd4k1xq3UZU9a10:daz3VdUpMuY5wboqIILimW2ZU9QZU
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 64a406348725c9474c74dd8f5c0e6c07_JaffaCakes118
Files
-
64a406348725c9474c74dd8f5c0e6c07_JaffaCakes118.exe windows:4 windows x86 arch:x86
321a78e131a6a57f2fa8a995c8b0c14c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
SetProcessPriorityBoost
SetThreadPriority
GetCurrentThread
SetPriorityClass
GetCurrentProcess
lstrcatW
lstrcpyW
GetEnvironmentVariableW
GetShortPathNameW
GetModuleFileNameW
Sleep
DeleteFileW
GetCurrentDirectoryW
CloseHandle
GetLastError
CreateMutexW
InterlockedExchange
VirtualAlloc
VirtualQuery
RtlUnwind
LoadLibraryA
HeapFree
VirtualFree
HeapCreate
HeapDestroy
GetStartupInfoA
GetFileType
SetHandleCount
GetCommandLineW
GetCommandLineA
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
MultiByteToWideChar
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetStdHandle
WriteFile
HeapSize
ExitProcess
MoveFileW
GetFileAttributesW
GetModuleHandleA
GetStartupInfoW
GetVersionExA
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
GetModuleFileNameA
GetProcAddress
TerminateProcess
HeapReAlloc
HeapAlloc
user32
LoadStringW
LoadAcceleratorsW
GetMessageW
TranslateAcceleratorW
TranslateMessage
DispatchMessageW
LoadIconW
RegisterClassExW
DefWindowProcW
DestroyWindow
DialogBoxParamW
BeginPaint
EndPaint
CreateWindowExW
FindWindowW
PostQuitMessage
EndDialog
LoadCursorW
shell32
ShellExecuteW
SHChangeNotify
ShellExecuteExW
Sections
.text Size: 16KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 48KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ