wmlaunch.pdb
Static task
static1
General
-
Target
14dd37a5f371023226f61c997f901194_JaffaCakes118
-
Size
484KB
-
MD5
14dd37a5f371023226f61c997f901194
-
SHA1
ce30db6ce37b084cea22b45e8c30179838490d60
-
SHA256
cc1bcda008587c618885106ce1ec61ab65dbd9959f20f30741bba9b4b518d1cb
-
SHA512
779723303056d73e05e88a28ac17020cce8fe4845a6bccff8e61d99fb6f9c3ade8d6d7206be90b1a5b3a95497cae822665877c500374585caed948fe37c9af53
-
SSDEEP
12288:bERF48SW0c5k/IrCpYLzLmpZ6DEZ1DJprnEijzP2kRaw:4T0c5k/GCpYLzLmpZ6YfDJprn9jD2kR
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 14dd37a5f371023226f61c997f901194_JaffaCakes118
Files
-
14dd37a5f371023226f61c997f901194_JaffaCakes118.exe windows:10 windows x64 arch:x64
08099d28176bb63328d92990503f05cd
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
advapi32
RegEnumValueW
RegDeleteValueW
RegOpenKeyExW
RegSetValueExW
RegEnumKeyExW
RegCreateKeyExW
RegQueryInfoKeyW
RegCloseKey
TraceMessage
RegQueryValueExW
kernel32
CreateThread
SetErrorMode
GetFileAttributesW
GetExitCodeThread
SetLastError
DebugBreak
DeviceIoControl
CreateFileW
GetVersion
QueryDosDeviceW
GetDriveTypeW
LoadLibraryW
LeaveCriticalSection
EnterCriticalSection
WideCharToMultiByte
GetVersionExW
lstrlenA
ExpandEnvironmentStringsW
lstrlenW
CompareStringW
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
GetTickCount
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCurrentProcessId
QueryPerformanceCounter
SetUnhandledExceptionFilter
GetStartupInfoW
Sleep
SizeofResource
VirtualProtect
lstrcpynW
VirtualAlloc
GetModuleFileNameW
InitializeCriticalSection
WaitForSingleObject
CreateEventW
MultiByteToWideChar
GetLastError
CloseHandle
GetSystemInfo
FindResourceExW
LoadResource
HeapDestroy
GetProcAddress
DeleteCriticalSection
GetModuleHandleW
SetEvent
LoadLibraryExW
VirtualQuery
lstrcmpiW
FreeLibrary
user32
CharPrevW
CharNextW
msvcrt
_exit
_cexit
__setusermatherr
_initterm
_wcmdln
_fmode
_commode
?terminate@@YAXXZ
_lock
_unlock
__dllonexit
_onexit
memcpy
memcmp
exit
_beginthreadex
_wtoi
bsearch
_wcsicmp
wcsncmp
towupper
wcsrchr
_wtol
__C_specific_handler
_wcsnicmp
wcsstr
__set_app_type
__wgetmainargs
realloc
wcscat_s
_purecall
free
malloc
_callnewh
_XcptFilter
_amsg_exit
_vsnwprintf
memmove
towlower
memcpy_s
iswspace
iswdigit
wcspbrk
wcschr
memset
ntdll
RtlLookupFunctionEntry
RtlVirtualUnwind
RtlCaptureContext
mpr
WNetGetConnectionW
WNetCancelConnection2W
WNetAddConnection2W
ole32
CoCreateInstance
CoRevokeClassObject
CoInitializeEx
CoTaskMemRealloc
PropVariantClear
CoRegisterClassObject
CoTaskMemFree
CoUninitialize
CoTaskMemAlloc
oleaut32
SysFreeString
VariantClear
SysStringLen
VarUI4FromStr
SysAllocStringLen
shell32
ShellExecuteExW
SHGetKnownFolderPath
shlwapi
PathGetCharTypeW
ord158
PathRemoveFileSpecW
mfplat
MFGetSupportedSchemes
Sections
.text Size: 59KB - Virtual size: 58KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 21KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 396KB - Virtual size: 1.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ