WritePlubpnb
Meyhxqb
ReadOrgsjov
Uqlqgueuk
Grheaua
EndBbrsnyv
Static task
static1
Behavioral task
behavioral1
Sample
e2b9db03486adc820cfec075611e8b72_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e2b9db03486adc820cfec075611e8b72_JaffaCakes118.exe
Resource
win10v2004-20240226-en
Target
e2b9db03486adc820cfec075611e8b72_JaffaCakes118
Size
404KB
MD5
e2b9db03486adc820cfec075611e8b72
SHA1
60589043e6e5df3fb9c3bae693e1d9bb5def1d02
SHA256
fefb4982020865bcf88b6ac78c9c1e7be701745ea81772ecf66ecd9d5f38735a
SHA512
19503f3a27cedb9874d036b536548bfff4dd89ed7f737baa53f77c43a4b44dd63d1c68d7adfb4b0c42f051d55046b1ede4a5cd776799a57b6f089c0f1107483d
SSDEEP
3072:YCPy9HjTpNYBqKfoot9U66tIwVjiCz2M4soIgQfmFgkwFhgH22Ai7igaliOx7H:xPsHjT897nU6WaMmDQStAiGgaZ
Checks for missing Authenticode signature.
resource |
---|
e2b9db03486adc820cfec075611e8b72_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
CallNamedPipeA
lstrlen
LZOpenFileA
GetVolumePathNameA
GetConsoleKeyboardLayoutNameA
IsWow64Process
SizeofResource
GetTempFileNameA
SetHandleCount
GetThreadContext
LocalCompact
IsValidLanguageGroup
GetPrivateProfileStructA
WriteProfileSectionA
Heap32Next
GetProfileSectionA
VirtualFree
OpenFile
ReadConsoleOutputAttribute
DeleteTimerQueueTimer
WriteConsoleOutputAttribute
VerifyVersionInfoA
WriteConsoleOutputCharacterA
GetVersion
GetShortPathNameA
FillConsoleOutputCharacterA
SetComputerNameExA
HeapQueryInformation
VirtualAlloc
WaitForMultipleObjects
CreateDirectoryExA
GetStringTypeA
GetDevicePowerState
ReadConsoleA
GetTickCount
SetFilePointer
RemoveDirectoryA
GetFileAttributesExA
GetFullPathNameA
FindNextChangeNotification
GetLocaleInfoA
GetEnvironmentStringsA
GetTimeFormatA
SetEvent
GetDllDirectoryA
FindFirstVolumeMountPointW
SetVolumeMountPointA
WritePrivateProfileStructA
RegisterWaitForSingleObject
Module32Next
FlushFileBuffers
TransactNamedPipe
FindFirstFileExA
SignalObjectAndWait
ClearCommError
QueryDosDeviceA
MapUserPhysicalPagesScatter
GetConsoleCP
GetModuleFileNameA
FindVolumeClose
GetVersionExA
DuplicateHandle
SetHandleInformation
CopyFileExA
GetConsoleCursorMode
LocalHandle
GetConsoleCommandHistoryA
_lwrite
UpdateResourceA
VirtualProtect
GetWindowsDirectoryA
OpenMutexA
SetProcessPriorityBoost
Process32Next
GetTickCount
LZSeek
CreateFileMappingW
MapViewOfFile
GetDiskFreeSpaceA
GetDateFormatA
AllocConsole
SearchPathA
GetTapeParameters
CreateWaitableTimerA
GetCurrentDirectoryA
SetConsoleHardwareState
ExpandEnvironmentStringsA
Heap32Next
SetConsoleIcon
GetLogicalDriveStringsA
GetProcessWorkingSetSize
TermsrvAppInstallMode
CreateNamedPipeA
ExpungeConsoleCommandHistoryA
GlobalFix
GetConsoleCursorInfo
GetConsoleCommandHistoryA
GetVolumeNameForVolumeMountPointA
FreeEnvironmentStringsA
DeleteTimerQueue
ClearCommError
GetLogicalDrives
CreateFileMappingW
FindResourceA
TransmitCommChar
DeleteTimerQueueEx
GetNumberFormatA
GetDefaultCommConfigA
IsValidCodePage
FindAtomA
BeginUpdateResourceA
GetProcessHandleCount
GetConsoleCP
GlobalSize
SetMailslotInfo
GetPrivateProfileStringA
IsBadReadPtr
GetDefaultCommConfigA
OpenWaitableTimerA
GetConsoleTitleA
HeapFree
ClearCommError
SetUserGeoID
GetStdHandle
GetStartupInfoA
SetConsoleMenuClose
OpenProcess
GetCommModemStatus
OpenJobObjectA
GetLogicalDriveStringsA
BeginUpdateResourceA
GetSystemDirectoryA
GetModuleHandleA
MultiByteToWideChar
IsBadCodePtr
OpenProcess
GetModuleHandleA
GetTickCount
ReadConsoleInputA
IsBadHugeWritePtr
GetDiskFreeSpaceA
IsBadStringPtrA
GetSystemDirectoryA
DeleteTimerQueueEx
OpenFileMappingA
SetPriorityClass
IsDebuggerPresent
ReleaseSemaphore
CreatePipe
GetConsoleMode
GetConsoleTitleA
FileTimeToDosDateTime
GetProcessAffinityMask
IsBadWritePtr
OpenSemaphoreA
SetPriorityClass
LZCloseFile
ReadConsoleOutputA
GetFileInformationByHandle
IsBadWritePtr
GetDiskFreeSpaceExA
IsBadStringPtrA
GetVolumePathNamesForVolumeNameA
VerifyVersionInfoA
SetFileShortNameA
Process32First
SetCurrentDirectoryA
LoadLibraryExW
MoveFileA
GetProcessHandleCount
SetConsoleLocalEUDC
QueryInformationJobObject
FreeEnvironmentStringsA
GetCaretBlinkTime
CheckMenuRadioItem
TileWindows
CallWindowProcA
GetWindowTextA
SetRect
GetDlgItemTextA
AnimateWindow
BlockInput
GetMenuState
FreeDDElParam
GrayStringA
ScreenToClient
UnhookWindowsHook
GetFocus
GetClipboardOwner
CharUpperBuffA
GetSysColor
CharLowerBuffA
TranslateMDISysAccel
SetMenuContextHelpId
CreateDialogIndirectParamA
GetMenuInfo
LoadMenuIndirectW
AdjustWindowRectEx
GetDesktopWindow
MessageBoxIndirectA
GetKeyboardLayout
CallWindowProcA
CallMsgFilter
MonitorFromWindow
GetSysColor
GetActiveWindow
GetWindowContextHelpId
UnhookWinEvent
LoadImageA
IsCharLowerA
GetNextDlgGroupItem
CharToOemA
RegisterDeviceNotificationA
SetProcessDefaultLayout
GrayStringA
GetGUIThreadInfo
GetCursorFrameInfo
SetParent
EnumThreadWindows
BroadcastSystemMessageA
GetWindowContextHelpId
SetSystemCursor
CreateDialogParamA
DestroyCaret
SystemParametersInfoA
OemToCharA
IsHungAppWindow
MapVirtualKeyExA
EnumClipboardFormats
GetRawInputBuffer
GetClipboardOwner
SetSysColorsTemp
GetKeyboardLayoutList
CreateWindowStationA
EnumWindows
GetMenuItemCount
GetDlgCtrlID
ShowStartGlass
LoadKeyboardLayoutEx
GetReasonTitleFromReasonCode
LoadMenuA
GetDlgCtrlID
GetAppCompatFlags
GetAltTabInfoA
ReplyMessage
EnumWindowStationsA
GrayStringA
GetKeyNameTextA
DrawTextExW
GetLastActivePopup
MessageBoxIndirectA
GetMenuStringA
GetMonitorInfoA
EnumDesktopsA
ShowWindow
ToAscii
OpenInputDesktop
GetAppCompatFlags
PackDDElParam
DestroyAcceleratorTable
OemToCharBuffA
CopyRect
GetMessagePos
closesocket
WritePlubpnb
Meyhxqb
ReadOrgsjov
Uqlqgueuk
Grheaua
EndBbrsnyv
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ