VSLauncher.pdb
Static task
static1
Behavioral task
behavioral1
Sample
d4af731ba83f1e9cec01271ebdd6871e_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
d4af731ba83f1e9cec01271ebdd6871e_JaffaCakes118
-
Size
179KB
-
MD5
d4af731ba83f1e9cec01271ebdd6871e
-
SHA1
42ee9d02204fab3d0ae0285a327aba8d9c700564
-
SHA256
6461a2ba5d6586453feac2ba8d10644e14113b35fa32abba84721acdd0e0c7e7
-
SHA512
3379e7564c3e9e8bbbb9796e24e2381220e216becdea3e4a8c4e22d012094f2058b061fdf2d9edc337d3096491c900c4464da13009e7995586732eb6eae5a781
-
SSDEEP
3072:n/3kFmqh46QVEP6/HtDwcB3xCBHK0X/G3wsatcWebVnIxK+SlX5UDeo:fJqm66ycB3WH18wsSAb5IMlX52H
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d4af731ba83f1e9cec01271ebdd6871e_JaffaCakes118
Files
-
d4af731ba83f1e9cec01271ebdd6871e_JaffaCakes118.exe windows:5 windows x86 arch:x86
b19f7c88d5ea1a1ba1807eaaf6f94894
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
advapi32
RegDeleteKeyA
RegCloseKey
RegQueryInfoKeyA
RegEnumKeyExA
RegOpenKeyExA
RegSetValueExA
RegCreateKeyExA
RegDeleteValueA
RegOpenKeyExW
RegQueryValueExW
kernel32
IsBadReadPtr
MultiByteToWideChar
GetLastError
UnmapViewOfFile
CloseHandle
HeapReAlloc
HeapFree
HeapAlloc
InitializeCriticalSection
IsDBCSLeadByte
lstrcmpiA
SizeofResource
LoadResource
FindResourceA
LoadLibraryExA
WideCharToMultiByte
GetModuleHandleA
lstrlenA
GetModuleFileNameA
InterlockedDecrement
InterlockedIncrement
FreeLibrary
DeleteCriticalSection
GetModuleFileNameW
FindFirstFileW
GetFileAttributesW
FindNextFileW
FindClose
GetUserDefaultUILanguage
LoadLibraryExW
ExpandEnvironmentStringsW
GetFullPathNameW
GetLongPathNameW
RaiseException
lstrlenW
GetStartupInfoW
GetStdHandle
CreateProcessW
WaitForSingleObject
GetCommandLineA
GetVersionExA
GetStartupInfoA
VirtualProtect
VirtualAlloc
GetProcAddress
GetSystemInfo
VirtualQuery
ExitProcess
WriteFile
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
HeapDestroy
MapViewOfFile
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
LeaveCriticalSection
EnterCriticalSection
TerminateProcess
GetCurrentProcess
SetUnhandledExceptionFilter
IsDebuggerPresent
Sleep
HeapSize
GetCPInfo
GetACP
GetOEMCP
InterlockedExchange
LoadLibraryA
RtlUnwind
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
GetThreadLocale
ReadFile
GetEnvironmentVariableA
LockResource
FindResourceExA
FlushFileBuffers
CreateFileA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
GetConsoleMode
GetConsoleCP
SetFilePointer
CreateFileMappingA
GetFileSize
CreateFileW
SetErrorMode
GetProcessHeap
HeapCreate
user32
CharNextA
GetDlgItem
SystemParametersInfoA
GetWindowRect
CharPrevW
SetWindowPos
DialogBoxParamW
SetDlgItemTextW
UnregisterClassA
EndDialog
SendMessageA
SendDlgItemMessageW
ole32
StringFromGUID2
CoCreateInstance
CoTaskMemAlloc
CoTaskMemRealloc
CoTaskMemFree
oleaut32
SysAllocString
VarUI4FromStr
SysAllocStringLen
SysStringLen
SysFreeString
shlwapi
PathAddBackslashW
shell32
SHGetFolderPathW
Sections
.text Size: 76KB - Virtual size: 76KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 91KB - Virtual size: 92KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE