Ft
Hto
Tevkno
Static task
static1
Behavioral task
behavioral1
Sample
fa38453a1bf1cb7c432ce6d2362106e4_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
fa38453a1bf1cb7c432ce6d2362106e4_JaffaCakes118.exe
Resource
win10v2004-20240412-en
Target
fa38453a1bf1cb7c432ce6d2362106e4_JaffaCakes118
Size
116KB
MD5
fa38453a1bf1cb7c432ce6d2362106e4
SHA1
676bb44fffaf0579c0a746d9cc1ec2f3636a3d03
SHA256
786fb6f8f0ae3bcb3833f1280c0612a32850e81bb207567e8de2b8641e328f9a
SHA512
457ab71c96a08d23a6147e62990c138d8ffca2272f8be95ca26555d93f819f9f8262f462ce46a93950e1df18935c20a1bff03e92873ba790a2a7eac358df0a17
SSDEEP
3072:hLMNQHRbQ1hg3+tbwEM6i3UweAy0dXCKWozkhB7X:hLMWH+43+JBi3UH09CK3zM
Checks for missing Authenticode signature.
resource |
---|
fa38453a1bf1cb7c432ce6d2362106e4_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
CloseHandle
CompareStringA
ExitProcess
GetACP
GetCommandLineA
GetModuleHandleA
GetOEMCP
GetPrivateProfileStringA
GetStartupInfoA
GetSystemTime
HeapAlloc
RtlUnwind
SetEndOfFile
SetLastError
SetUnhandledExceptionFilter
TlsFree
UnmapViewOfFile
VirtualFree
lstrcatA
lstrcpyA
ToAscii
ShowOwnedPopups
OemToCharBuffA
LoadAcceleratorsW
GetFocus
EndDeferWindowPos
EnableWindow
DestroyIcon
CharPrevA
GetWindowTextA
LsaEnumerateTrustedDomains
LsaGetQuotasForAccount
LsaGetRemoteUserName
LsaLookupNames
LsaLookupPrivilegeDisplayName
__vbaCyStr
__vbaCyInt
__vbaCyAbs
__vbaExitEachVar
__vbaAryConstruct2
__vbaExitEachColl
__vbaExitEachAry
__vbaEraseKeepData
__vbaDateVar
__vbaCyVar
DirectInputCreateA
DirectInputCreateEx
DirectInputCreateW
Ft
Hto
Tevkno
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ