c:\b\build\slave\chrome-official\build\src\build\Release\chrome_launcher.pdb
Static task
static1
Behavioral task
behavioral1
Sample
fca6f7288a0c9aeb329bbbc55dadea28_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fca6f7288a0c9aeb329bbbc55dadea28_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
fca6f7288a0c9aeb329bbbc55dadea28_JaffaCakes118
-
Size
250KB
-
MD5
fca6f7288a0c9aeb329bbbc55dadea28
-
SHA1
a06551cf3dafa822ae30588b233afa9a389a24f6
-
SHA256
b3cc1fbdd3f907c6fb1fb204598c1709d7fa8e106f623fb41f667dde161fbf22
-
SHA512
1d7b716baf88138fecd0f6a032fe9acba82d0adbcc81aa27437b5a274bb34c13cb169662eab6cd689ac9571a55a250cd96dcbe703ba86630b5f3855171b1c935
-
SSDEEP
6144:/SxKDLLphyNZ+dsGsn/1ulWBnwHkKW5SwpmiRw7:dDphEZ+qGs/1tnwjRi6
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource fca6f7288a0c9aeb329bbbc55dadea28_JaffaCakes118
Files
-
fca6f7288a0c9aeb329bbbc55dadea28_JaffaCakes118.exe windows:5 windows x86 arch:x86
d90083c8eb7bd1bdbd1a828b76ab834d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
shlwapi
PathRemoveFileSpecW
PathFileExistsW
PathAppendW
PathGetArgsW
kernel32
GetCommandLineW
CreateProcessW
GetModuleFileNameW
lstrlenW
CloseHandle
WaitForSingleObject
GetExitCodeProcess
GetCurrentProcessId
LocalFree
CreateFileA
GetCurrentProcess
GetTempPathW
ReleaseSemaphore
GetCurrentThreadId
LeaveCriticalSection
EnterCriticalSection
VirtualQuery
CreateFileW
InterlockedDecrement
DeleteCriticalSection
SetUnhandledExceptionFilter
FreeLibrary
RtlCaptureContext
GetProcAddress
LoadLibraryW
CreateThread
CreateSemaphoreW
InitializeCriticalSection
InterlockedIncrement
WaitNamedPipeW
GetLastError
WaitForMultipleObjects
SetEvent
ResetEvent
WriteFile
TransactNamedPipe
SetNamedPipeHandleState
LocalAlloc
InterlockedExchange
LoadLibraryA
RaiseException
TerminateProcess
UnhandledExceptionFilter
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
Sleep
ExitProcess
RtlUnwind
HeapFree
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
HeapAlloc
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetStartupInfoA
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
InitializeCriticalSectionAndSpinCount
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
FlushFileBuffers
VirtualAlloc
HeapReAlloc
HeapSize
LCMapStringA
MultiByteToWideChar
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
SetFilePointer
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetStdHandle
ole32
CoUninitialize
CoInitialize
CoCreateInstance
advapi32
OpenProcessToken
GetTokenInformation
ConvertSidToStringSidW
Sections
.text Size: 59KB - Virtual size: 58KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
PACK Size: 164KB - Virtual size: 424KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE