Ndtgnohmf
Mifdfexjxpb
Csiqcjoqor
ReadGmdnufn
Ogiqhjjwwb
Dxiphqb
Static task
static1
Behavioral task
behavioral1
Sample
f9705bc102d177280e4f00b14f8c9a59_JaffaCakes118.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
f9705bc102d177280e4f00b14f8c9a59_JaffaCakes118.exe
Resource
win10v2004-20240412-en
Target
f9705bc102d177280e4f00b14f8c9a59_JaffaCakes118
Size
404KB
MD5
f9705bc102d177280e4f00b14f8c9a59
SHA1
aa23d4c3a1320c8682cf677ea9459b501c721c84
SHA256
cd4ba38a2c706946eb3c819657967606ea5c949eb1e33e2a29345fc36e30f614
SHA512
cfc82894a8add94719bb8d1e7f19602cf35b2e5ec6f40d9613f102124ea1afae66dbf8744646efed93f8512a6c5d3ed42947e357b2127a65860e9e69b015a53d
SSDEEP
3072:C5Z+6MM9gcWt88WlQgk8rZgu4Scv2DRhNwvai4d2SCFWJin0yp9Xtf9W9:C5ZMf884QgXZ4Sma52SCFWGrV9W
Checks for missing Authenticode signature.
resource |
---|
f9705bc102d177280e4f00b14f8c9a59_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
OpenSemaphoreA
GlobalUnWire
SetTimerQueueTimer
SetConsoleScreenBufferSize
GlobalHandle
CommConfigDialogA
GetWindowsDirectoryA
GetFileAttributesExA
DeleteTimerQueue
QueryPerformanceCounter
SizeofResource
GetDiskFreeSpaceA
SetHandleContext
GetDefaultCommConfigA
GetCommModemStatus
OpenWaitableTimerA
PurgeComm
ClearCommError
VirtualAlloc
GetThreadLocale
CancelWaitableTimer
LocalHandle
GetProcessShutdownParameters
FlushViewOfFile
HeapSize
GetConsoleInputWaitHandle
ReplaceFileA
GetTickCount
TerminateJobObject
lstrcmpiA
GetCurrentProcessId
ReleaseSemaphore
GetThreadTimes
GlobalFindAtomA
GetProcessId
GetEnvironmentVariableA
GetVolumePathNameA
ReadConsoleOutputCharacterA
GetFileSize
GetModuleHandleA
GetNamedPipeHandleStateA
GetTempPathA
UnlockFileEx
lstrlenA
GetConsoleAliasExesLengthA
OpenMutexA
GetCommTimeouts
FindFirstFileExA
IsBadReadPtr
VirtualProtectEx
GetProcessHeaps
EndUpdateResourceA
FindFirstFileA
GetCPInfo
SetInformationJobObject
DeleteFileA
WriteProfileSectionA
GetCurrentDirectoryA
GetWindowsDirectoryA
GetFileAttributesA
GetComputerNameA
IsBadStringPtrA
GetSystemWindowsDirectoryA
SetFileValidData
GetFileSizeEx
IsBadWritePtr
GetDriveTypeA
SetConsoleHardwareState
UpdateResourceA
IsValidLanguageGroup
LoadLibraryA
ExitThread
VerifyVersionInfoA
EnumSystemCodePagesA
HeapFree
ReadConsoleA
RegisterWaitForSingleObjectEx
GetConsoleAliasExesLengthW
GetDiskFreeSpaceExA
GetProfileIntA
WriteConsoleInputA
GetPrivateProfileSectionNamesA
SetSystemPowerState
OpenEventA
GetProcessVersion
GetVersionExA
VirtualQueryEx
SuspendThread
GetConsoleCursorInfo
OpenMutexA
SetConsoleMenuClose
GetCPInfoExA
ReadConsoleOutputCharacterA
WriteConsoleOutputCharacterA
GetVolumeInformationA
FileTimeToDosDateTime
HeapSize
CreateTimerQueue
GetCurrentDirectoryA
FindVolumeClose
Heap32Next
GetProcessHeaps
GetDiskFreeSpaceA
ReadConsoleOutputAttribute
GetConsoleTitleA
OpenJobObjectA
GetProcessTimes
UpdateResourceA
GetProcessVersion
GetSystemDirectoryA
GetConsoleAliasesLengthA
GetProcessHandleCount
GetModuleHandleA
VerifyVersionInfoA
GetConsoleCommandHistoryLengthA
FreeEnvironmentStringsA
GetConsoleTitleA
OpenThread
FillConsoleOutputCharacterA
VirtualLock
ReleaseMutex
SetStdHandle
GetLongPathNameA
GetCurrentProcessId
ExpungeConsoleCommandHistoryA
FileTimeToLocalFileTime
GetConsoleInputExeNameA
GetSystemWindowsDirectoryA
WriteConsoleInputA
GetFileType
GetConsoleCP
GetCurrentConsoleFont
GetSystemTimes
OpenMutexA
VirtualQuery
GetLogicalDriveStringsA
SetFileApisToOEM
IsBadCodePtr
OpenFileMappingA
GetLocaleInfoA
HeapFree
BuildCommDCBA
GetConsoleHardwareState
GetVolumePathNamesForVolumeNameA
GlobalMemoryStatus
GetModuleFileNameA
GetExitCodeProcess
GetModuleFileNameA
OpenWaitableTimerA
FillConsoleOutputAttribute
WriteConsoleOutputA
WritePrivateProfileStructA
PeekConsoleInputA
GetTickCount
GetComputerNameA
GetCurrentThreadId
SearchPathA
GetCurrentProcess
HeapSize
SetSystemPowerState
ClearCommBreak
GlobalSize
WriteConsoleOutputA
GetConsoleWindow
LZClose
SetFileAttributesA
TerminateProcess
SetLocalPrimaryComputerNameA
Heap32First
GetCurrentConsoleFont
ChangeTimerQueueTimer
GetDriveTypeA
Process32Next
GetSystemTime
SetFileAttributesA
_hwrite
SetConsolePalette
DefWindowProcA
RegisterUserApiHook
UnregisterUserApiHook
RedrawWindow
FrameRect
GetProcessWindowStation
MessageBeep
GetDlgItem
CloseDesktop
DialogBoxIndirectParamAorW
ExcludeUpdateRgn
CreateIconIndirect
SetWindowWord
GetWindowRgnBox
GetWindowDC
GrayStringA
UpdateLayeredWindow
GetDoubleClickTime
IsClipboardFormatAvailable
CreateWindowExA
GetSysColorBrush
DestroyMenu
RegisterSystemThread
BroadcastSystemMessageExA
PrivateExtractIconsA
DlgDirListComboBoxA
GetWindowTextA
FindWindowExA
GetUserObjectSecurity
MenuItemFromPoint
KillTimer
ChildWindowFromPointEx
SetMessageQueue
OemToCharBuffA
CloseWindowStation
CopyRect
GetWindowDC
UpdateWindow
LoadMenuA
GetClassLongA
EqualRect
DlgDirListComboBoxA
CreateCursor
SwapMouseButton
SetWindowPos
GetMenuItemID
CharLowerBuffW
AttachThreadInput
GetMenuItemCount
ChangeDisplaySettingsExA
CreateWindowStationA
GetMessagePos
EnumThreadWindows
RedrawWindow
GetWindowTextLengthA
RegisterLogonProcess
ClientToScreen
IsWindowInDestroy
ExcludeUpdateRgn
SetTimer
GetKeyboardLayoutNameA
SetDlgItemTextA
SetWindowLongA
TrackMouseEvent
CallMsgFilterA
MonitorFromWindow
GetScrollPos
SetTaskmanWindow
CharLowerBuffA
GetWindowModuleFileNameA
DlgDirListComboBoxA
SetFocus
RegisterSystemThread
RedrawWindow
GetKeyNameTextA
MessageBoxTimeoutA
OemToCharBuffA
GetWindowLongA
LockSetForegroundWindow
DefDlgProcA
EnumWindows
InvalidateRgn
CreateIcon
SetShellWindow
ShowScrollBar
CreateDialogParamA
IsChild
CheckMenuRadioItem
DlgDirSelectComboBoxExA
GetWindowInfo
closesocket
Ndtgnohmf
Mifdfexjxpb
Csiqcjoqor
ReadGmdnufn
Ogiqhjjwwb
Dxiphqb
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ