d:\1.Develop\UnifyLauncherEx\Executable\Release_PH\DebugInfo\LaunchLinker.pdb
Static task
static1
Behavioral task
behavioral1
Sample
14a10ac18d2de2639e4f13fc8551f62a_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
14a10ac18d2de2639e4f13fc8551f62a_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
14a10ac18d2de2639e4f13fc8551f62a_JaffaCakes118
-
Size
100KB
-
MD5
14a10ac18d2de2639e4f13fc8551f62a
-
SHA1
7b5a37af14c10952a67b49fcdfe43e0dce431bec
-
SHA256
ac0a65b354da1e42c6707c70ab95aa7b3ad791fe3d824ecf6c5e621eba7edff6
-
SHA512
bad8aafe8338853d480ad4dd6adbaf9ac2667ad82301167bc25b905d25e3b194f61962d427830baa2b06dd499cd9cdac4621d357c751f09404f3a5cea3b35885
-
SSDEEP
1536:QQ3Unb03lhNmagLnjGfdHUy3kpQkrL/kanjj7tDLXMwSf:QQcbCmabFQLRjj7tDLXTSf
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 14a10ac18d2de2639e4f13fc8551f62a_JaffaCakes118
Files
-
14a10ac18d2de2639e4f13fc8551f62a_JaffaCakes118.exe windows:4 windows x86 arch:x86
a3c106855fa00a68c45225023599e699
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
wininet
HttpSendRequestW
InternetCrackUrlW
InternetCloseHandle
HttpQueryInfoW
HttpOpenRequestW
InternetReadFile
InternetOpenUrlW
InternetOpenW
InternetConnectW
kernel32
ReadFile
SetEndOfFile
SetFileAttributesW
DeleteFileW
GetLastError
FindClose
FindFirstFileW
GetModuleFileNameW
SetCurrentDirectoryW
Sleep
GetCurrentDirectoryW
WaitForSingleObject
LeaveCriticalSection
CreateFileA
DeleteCriticalSection
CloseHandle
InitializeCriticalSection
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
FlushFileBuffers
SetStdHandle
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
EnterCriticalSection
FreeEnvironmentStringsA
SetFilePointer
CreateFileW
GetLocaleInfoA
HeapFree
GetVersionExA
HeapAlloc
GetProcessHeap
GetStartupInfoW
ExitThread
GetCurrentThreadId
CreateThread
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetProcAddress
GetModuleHandleA
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
MultiByteToWideChar
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
InterlockedDecrement
HeapDestroy
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
RtlUnwind
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
HeapSize
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
RaiseException
LoadLibraryA
VirtualAlloc
HeapReAlloc
user32
PostQuitMessage
SetTimer
EndDialog
MessageBoxW
SetDlgItemTextW
SetWindowPos
KillTimer
GetClientRect
GetSystemMetrics
DialogBoxParamW
advapi32
RegCreateKeyExW
RegCloseKey
RegQueryValueExW
RegSetValueExW
shell32
ShellExecuteExW
shlwapi
PathAddBackslashW
Sections
.text Size: 52KB - Virtual size: 50KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 16KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 8KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 88KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE