C:\b\build\slave\win\build\src\build\Release\chrome_launcher.pdb
Static task
static1
Behavioral task
behavioral1
Sample
3b4c380ec2a9f4a2b30c5806cb8a13a7_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3b4c380ec2a9f4a2b30c5806cb8a13a7_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
3b4c380ec2a9f4a2b30c5806cb8a13a7_JaffaCakes118
-
Size
123KB
-
MD5
3b4c380ec2a9f4a2b30c5806cb8a13a7
-
SHA1
83cac5c22530fc64b6e7db08d604952f4bb3a07b
-
SHA256
72a2e81dfc9b38d74d6150cfd4764aa1ae26e83f90a3a090d8e9adf440adfafb
-
SHA512
5aed44bfdb53f92eff9de143a5cb6df661f6d066695c0ca9385174a8a851c09d87d3eaff63b2c033c8167abb09e344c07416f8162d4d79b6782cbb8bb891f3ba
-
SSDEEP
3072:wTaDsF/zd3GtzHqRagLZSZ2AnbrC9LRvmGeNs:xDsF/zdSzHqRagLZuZUvmGe
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3b4c380ec2a9f4a2b30c5806cb8a13a7_JaffaCakes118
Files
-
3b4c380ec2a9f4a2b30c5806cb8a13a7_JaffaCakes118.exe windows:5 windows x86 arch:x86
797eef0b19f46c5b9ab86fc74388104c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
shlwapi
PathRemoveFileSpecW
PathFileExistsW
PathAppendW
PathGetArgsW
kernel32
CreateProcessW
GetModuleFileNameW
lstrlenW
lstrlenA
WaitForSingleObject
GetExitCodeProcess
GetCurrentProcessId
LocalFree
GetCommandLineW
SetStdHandle
WriteConsoleW
CloseHandle
FlushFileBuffers
HeapReAlloc
GetConsoleMode
GetConsoleCP
LocalAlloc
GetProcAddress
FreeLibrary
InterlockedExchange
GetLastError
LoadLibraryA
RaiseException
ReleaseSemaphore
GetCurrentThreadId
LeaveCriticalSection
EnterCriticalSection
GetCurrentProcess
VirtualQuery
CreateFileW
SetUnhandledExceptionFilter
RtlCaptureContext
InterlockedDecrement
DeleteCriticalSection
LoadLibraryW
CreateThread
CreateSemaphoreW
InitializeCriticalSection
InterlockedIncrement
WaitNamedPipeW
WaitForMultipleObjects
SetEvent
ResetEvent
WriteFile
TransactNamedPipe
SetNamedPipeHandleState
GetTempPathW
UnhandledExceptionFilter
IsDebuggerPresent
EncodePointer
DecodePointer
TerminateProcess
HeapSetInformation
GetStartupInfoW
GetModuleHandleW
ExitProcess
HeapFree
IsProcessorFeaturePresent
HeapAlloc
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
HeapCreate
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
Sleep
HeapSize
WideCharToMultiByte
LCMapStringW
MultiByteToWideChar
GetStringTypeW
RtlUnwind
SetFilePointer
advapi32
OpenProcessToken
GetTokenInformation
ConvertSidToStringSidW
RegCloseKey
RegOpenKeyExW
RegQueryValueExW
ole32
CoUninitialize
CoInitialize
CoCreateInstance
Sections
.text Size: 44KB - Virtual size: 44KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 52KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE