?Exfit2@@YAKKK@Z
?Exfit@@YAKKK@Z
Static task
static1
Behavioral task
behavioral1
Sample
0c007e0be40bab69a5461eb31ddbfb93_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
0c007e0be40bab69a5461eb31ddbfb93_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Target
0c007e0be40bab69a5461eb31ddbfb93_JaffaCakes118
Size
167KB
MD5
0c007e0be40bab69a5461eb31ddbfb93
SHA1
4e2a41a93a8b62e2804d1ffa8975fd350edb07f8
SHA256
2f6027e0cffbf063bf6e66cf50acb4fdd9bfcd8b54961cf794565bafc1431182
SHA512
97a8f6aae79cac2284019a85ab4c7bdd57801732f7a012e1cef6761b687142529f136bf7ab25d5ba998e2e3d4ea3a1acb0c84d7ad42fb67a9ecc789d90efebdb
SSDEEP
3072:rBT4BgGHZMPnJX/Mjx3I9oDDK9ziZ1aIAxMFnza0Gr2ROq3sYaa0nxo:rB0Wnd/MjdDK9w1mw+t2ua0O
Checks for missing Authenticode signature.
resource |
---|
0c007e0be40bab69a5461eb31ddbfb93_JaffaCakes118 |
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetTickCount
Sleep
GetProcAddress
GetLastError
VirtualAlloc
ResetEvent
FlushFileBuffers
SetStdHandle
LCMapStringW
LCMapStringA
RaiseException
SetFilePointer
GetOEMCP
GetACP
GetCPInfo
IsBadWritePtr
IsBadReadPtr
HeapValidate
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
ExitProcess
HeapAlloc
DebugBreak
GetStdHandle
WriteFile
InterlockedDecrement
OutputDebugStringA
LoadLibraryA
InterlockedIncrement
GetModuleFileNameA
HeapReAlloc
HeapFree
HeapDestroy
HeapCreate
VirtualFree
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetFileType
RtlUnwind
MultiByteToWideChar
GetStringTypeA
GetStringTypeW
CloseHandle
GetActiveWindow
FindWindowA
SetFocus
SetActiveWindow
joySetThreshold
acmFilterChooseA
?Exfit2@@YAKKK@Z
?Exfit@@YAKKK@Z
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ