QQ841374296
ffffffff
gadsfas
ggggggggg
wwwwwwwww
xxxxxxxxx
zxsahduo
Static task
static1
Behavioral task
behavioral1
Sample
fdf892b1f8ebb54b298512537e2182b8_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
fdf892b1f8ebb54b298512537e2182b8_JaffaCakes118.exe
Resource
win10v2004-20240412-en
Target
fdf892b1f8ebb54b298512537e2182b8_JaffaCakes118
Size
216KB
MD5
fdf892b1f8ebb54b298512537e2182b8
SHA1
17091126634f6e54befb672e34391309db318d70
SHA256
d6d3ae19bb6243b810b0476a46e89e58612a433582dfc5657a00783d1788877e
SHA512
14524dd81152799ae0bb69189e08aa7783c19c30e19ba62b8047794516f80976b5e9da2f22b2784c5c03542c2ef58281859d3cb00c6192e18a553052bddbdde4
SSDEEP
3072:3P7qYoFa8YBi2d1FUh6yTq0dM+Twzf5fGtIvIlRPzUJj2CpEqOtI2j:3AGlyOx+Ezf5Ot0Jj7KqB2j
Checks for missing Authenticode signature.
resource |
---|
fdf892b1f8ebb54b298512537e2182b8_JaffaCakes118 |
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
InterlockedExchange
LocalAlloc
CreateToolhelp32Snapshot
Process32Next
OpenProcess
LocalSize
CreateMutexA
MoveFileExA
CopyFileA
SetFileAttributesA
OpenEventA
CloseHandle
GetSystemInfo
WaitForSingleObject
SetEvent
CreateEventA
GetModuleFileNameA
WinExec
ExitProcess
MultiByteToWideChar
GetTickCount
ExitThread
CreateThread
GetCurrentProcess
GetVersionExA
lstrcatA
MoveFileA
WriteFile
SetFilePointer
ReadFile
CreateFileA
LocalReAlloc
FindNextFileA
GetLogicalDriveStringsA
GetVolumeInformationA
GetDiskFreeSpaceExA
GetDriveTypeA
lstrlenA
GetFileAttributesA
CreateDirectoryA
GetLastError
DeleteFileA
OutputDebugStringA
lstrcpyA
Sleep
InterlockedIncrement
InterlockedDecrement
WideCharToMultiByte
LocalFree
SetLastError
lstrcpynA
InitializeCriticalSection
TlsAlloc
GlobalFree
GlobalUnlock
GlobalHandle
GlobalLock
GlobalReAlloc
GlobalAlloc
TlsSetValue
TlsGetValue
GetVersion
GetCurrentThreadId
GetModuleHandleA
GlobalDeleteAtom
GlobalFindAtomA
GlobalAddAtomA
lstrcmpiA
GlobalGetAtomNameA
FreeLibrary
GetProcessVersion
lstrcmpA
GlobalFlags
GetCPInfo
GetOEMCP
FlushFileBuffers
RtlUnwind
RaiseException
HeapFree
HeapAlloc
GetTimeZoneInformation
GetSystemTime
GetLocalTime
HeapReAlloc
GetSystemTimeAsFileTime
GetStartupInfoA
GetCommandLineA
HeapSize
TerminateProcess
GetACP
SetUnhandledExceptionFilter
GetEnvironmentVariableA
HeapDestroy
HeapCreate
IsBadWritePtr
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
SetStdHandle
CompareStringA
CompareStringW
SetEnvironmentVariableA
VirtualAlloc
EnterCriticalSection
LeaveCriticalSection
VirtualFree
DeleteCriticalSection
LoadLibraryA
GetProcAddress
DispatchMessageA
GetNextDlgTabItem
GetFocus
EnableMenuItem
CheckMenuItem
SetMenuItemBitmaps
ModifyMenuA
GetMenuState
LoadBitmapA
GetMenuCheckMarkDimensions
GetWindowRect
GetWindowPlacement
IsIconic
RegisterWindowMessageA
SetWindowPos
SetWindowLongA
GetWindow
SetForegroundWindow
GetMessagePos
GetMessageTime
DefWindowProcA
RemovePropA
CallWindowProcA
GetPropA
SetPropA
GetClassLongA
DestroyWindow
GetDlgCtrlID
GetDlgItem
GetMenuItemID
GetSubMenu
GetMenuItemCount
GetMenu
RegisterClassA
GetClassInfoA
WinHelpA
GetCapture
GetTopWindow
CopyRect
CallNextHookEx
GetClientRect
AdjustWindowRectEx
SetFocus
GetSysColor
MapWindowPoints
LoadIconA
SetWindowTextA
LoadCursorA
GetSysColorBrush
GetClassNameA
PtInRect
ClientToScreen
PostQuitMessage
DestroyMenu
TabbedTextOutA
DrawTextA
GrayStringA
IsWindowEnabled
GetWindowLongA
MessageBoxA
EnableWindow
LoadStringA
wsprintfA
ExitWindowsEx
GetWindowTextA
GetForegroundWindow
GetAsyncKeyState
GetKeyState
DestroyCursor
SendMessageA
PeekMessageA
SetWindowsHookExA
UnhookWindowsHookEx
GetParent
IsWindow
CloseWindow
CreateWindowExA
PostMessageA
OpenDesktopA
GetThreadDesktop
GetUserObjectInformationA
OpenInputDesktop
SetThreadDesktop
CloseDesktop
EnumWindows
IsWindowVisible
GetWindowThreadProcessId
GetInputState
PostThreadMessageA
GetCursorPos
ReleaseDC
GetDesktopWindow
GetDC
SetRect
GetSystemMetrics
GetClipboardData
OpenClipboard
EmptyClipboard
SetClipboardData
CloseClipboard
mouse_event
SetCursorPos
WindowFromPoint
SetCapture
MapVirtualKeyA
keybd_event
SystemParametersInfoA
GetLastActivePopup
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
SetViewportExtEx
GetStockObject
ScaleViewportExtEx
CreateBitmap
Escape
ExtTextOutA
TextOutA
RestoreDC
PtVisible
ScaleWindowExtEx
SetWindowExtEx
SelectObject
CreateDIBSection
CreateCompatibleDC
DeleteObject
DeleteDC
BitBlt
GetDIBits
CreateCompatibleBitmap
SaveDC
GetDeviceCaps
GetObjectA
SetBkColor
SetTextColor
GetClipBox
RectVisible
GetUserNameA
ControlService
CloseServiceHandle
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegCloseKey
RegCreateKeyExA
RegSetValueExA
QueryServiceStatus
OpenServiceA
OpenSCManagerA
RegQueryValueA
RegOpenKeyExA
CloseEventLog
ClearEventLogA
OpenEventLogA
RegQueryValueExA
RegEnumKeyExA
CreateServiceA
DeleteService
RegisterServiceCtrlHandlerA
SetServiceStatus
RegOpenKeyA
RegDeleteValueA
RegDeleteKeyA
SHGetSpecialFolderPathA
SHGetFileInfoA
ord17
NetUserAdd
NetLocalGroupAddMembers
InternetReadFile
InternetOpenUrlA
InternetOpenA
InternetCloseHandle
capGetDriverDescriptionA
capCreateCaptureWindowA
ClosePrinter
DocumentPropertiesA
OpenPrinterA
QQ841374296
ffffffff
gadsfas
ggggggggg
wwwwwwwww
xxxxxxxxx
zxsahduo
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ