d:\WorkBox\WorkBox\Develop\Projects\UnifyLauncherEx\Executable\Release_PH\DebugInfo\LaunchLinker.pdb
Static task
static1
Behavioral task
behavioral1
Sample
f5c252147a21fb42f3e1bab298ff2fa5_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f5c252147a21fb42f3e1bab298ff2fa5_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f5c252147a21fb42f3e1bab298ff2fa5_JaffaCakes118
-
Size
100KB
-
MD5
f5c252147a21fb42f3e1bab298ff2fa5
-
SHA1
32914636526c7054941a475e232ef97e38b2e196
-
SHA256
a97d1839b959789940c5e40d5258b38081259fc9499aff80a1beb218a9ed9ba8
-
SHA512
e6e1ed1707eee84969be0852069ccc56bf5844d72af509163a6e5772d9e0d8a8ecd267ae63c4c9053d21ad67fa273d8118a09dd1309a4ad6e8d846f4013e3518
-
SSDEEP
1536:GH3cDbxCN+V299iFg1mFWO43wcki5iP8kYZeVUwLt7XHMwy7:GH4bKsQniPXewLt7XHTy7
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f5c252147a21fb42f3e1bab298ff2fa5_JaffaCakes118
Files
-
f5c252147a21fb42f3e1bab298ff2fa5_JaffaCakes118.exe windows:4 windows x86 arch:x86
11a1dcb68c76fd8ccb0815ccd2790637
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
wininet
InternetConnectW
HttpSendRequestW
InternetCrackUrlW
InternetOpenW
InternetCloseHandle
HttpQueryInfoW
InternetReadFile
InternetOpenUrlW
HttpOpenRequestW
kernel32
SetEndOfFile
CreateFileA
DeleteFileW
SetFileAttributesW
GetModuleFileNameW
SetCurrentDirectoryW
FindFirstFileW
FindClose
GetLastError
WaitForSingleObject
Sleep
GetCurrentDirectoryW
ReadFile
EnterCriticalSection
DeleteCriticalSection
CloseHandle
InitializeCriticalSection
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
CreateFileW
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
LeaveCriticalSection
MultiByteToWideChar
SetFilePointer
GetLocaleInfoA
FlushFileBuffers
HeapFree
GetVersionExA
HeapAlloc
GetProcessHeap
GetStartupInfoW
ExitThread
GetCurrentThreadId
CreateThread
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetProcAddress
GetModuleHandleA
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
InterlockedDecrement
HeapDestroy
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
HeapSize
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
RtlUnwind
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
RaiseException
LoadLibraryA
VirtualAlloc
HeapReAlloc
SetStdHandle
user32
DialogBoxParamW
EndDialog
MessageBoxW
SetDlgItemTextW
SetWindowPos
SetTimer
GetSystemMetrics
GetClientRect
KillTimer
advapi32
RegCreateKeyExW
RegSetValueExW
RegQueryValueExW
RegCloseKey
shell32
ShellExecuteExW
shlwapi
PathAddBackslashW
Sections
.text Size: 52KB - Virtual size: 50KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 16KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 8KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 96KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE