Tpxskigmsem
Winuvlt
GetHfdrqoq
Static task
static1
Behavioral task
behavioral1
Sample
1858d005365ed746f296921329ab0ac4_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
1858d005365ed746f296921329ab0ac4_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Target
1858d005365ed746f296921329ab0ac4_JaffaCakes118
Size
136KB
MD5
1858d005365ed746f296921329ab0ac4
SHA1
35d3fe99c32215aa331a1840a5d93e6b58e07d2e
SHA256
c250051c8ccd74ae9a9a4d1440dd348ffaf1ec27a17d69fd83a61360019e08e8
SHA512
7dfe044f2efaba7cd0404136581b81cb678ece9000062548765c98d7cdba7be0a2d341308301f90720a72146be4d54708f878c68f9f0bdd2a1b4f004a9c53d5d
SSDEEP
3072:kkR/+DH/Js2BqB4Qozz2xME9838YYKskI:kva2I3ozz2SE9838fK
Checks for missing Authenticode signature.
resource |
---|
1858d005365ed746f296921329ab0ac4_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
TransmitCommChar
WriteProfileStringA
CompareFileTime
GetThreadPriority
GetCurrentThread
FindVolumeMountPointClose
GetDriveTypeA
IsBadStringPtrA
ExitProcess
EnumUILanguagesA
GetThreadIOPendingFlag
VirtualAllocEx
SetConsoleNumberOfCommandsA
CallNamedPipeA
GetDiskFreeSpaceA
CreatePipe
GetProcessHeaps
GetConsoleCursorInfo
GetConsoleCursorMode
IsSystemResumeAutomatic
GetSystemTimes
Process32Next
GetProcAddress
lstrcpyA
SetProcessWorkingSetSize
GetFileSizeEx
GetConsoleCP
GetSystemDirectoryA
GetCurrentProcess
ReadConsoleOutputAttribute
lstrcatA
GetBinaryTypeA
LocalAlloc
lstrcpynA
GetProcessIoCounters
GetFileAttributesA
GetConsoleAliasExesLengthA
WriteConsoleOutputA
VirtualProtect
GetNamedPipeHandleStateA
CommConfigDialogA
PurgeComm
GlobalSize
AllocConsole
ClearCommBreak
CompareStringA
GetDllDirectoryA
GetComputerNameA
GetDiskFreeSpaceExA
GetNumberOfConsoleInputEvents
SetLastError
IsBadHugeReadPtr
GetPrivateProfileSectionA
WaitCommEvent
DefineDosDeviceA
TermsrvAppInstallMode
lstrcmpA
CopyFileExA
ConvertDefaultLocale
OpenProcess
WritePrivateProfileStringA
CancelWaitableTimer
GetThreadContext
OpenWaitableTimerA
GetConsoleOutputCP
GetMailslotInfo
GetConsoleInputExeNameA
DeleteTimerQueueTimer
GetProcessShutdownParameters
OpenMutexA
GetCommTimeouts
_lcreat
RemoveDirectoryA
RemoveDirectoryA
Heap32First
GetCPInfoExA
LZSeek
CreateSocketHandle
SetDllDirectoryA
WaitForSingleObjectEx
GetThreadSelectorEntry
GetLocaleInfoA
GetThreadPriorityBoost
GetCommState
GetFileInformationByHandle
SetConsoleCursorPosition
timeGetSystemTime
GetWindowWord
GetCapture
IsCharLowerA
SendMessageCallbackA
SetActiveWindow
GetDlgItemInt
CliImmSetHotKey
GetMouseMovePointsEx
GetWindowTextA
GetScrollInfo
GetWinStationInfo
ReleaseDC
MapWindowPoints
SetSystemMenu
DisplayExitWindowsWarnings
GetLastInputInfo
ReuseDDElParam
SwapMouseButton
TranslateMessage
GetWindowTextLengthA
FlashWindowEx
DlgDirSelectComboBoxExA
GetCursorInfo
BuildReasonArray
RealGetWindowClass
UpdateLayeredWindow
GetWindowInfo
GetReasonTitleFromReasonCode
MenuItemFromPoint
GetSystemMetrics
SetActiveWindow
BeginPaint
GetTopWindow
RegisterHotKey
DlgDirListComboBoxW
MapDialogRect
GetQueueStatus
EnumPropsA
SetInternalWindowPos
GetMessageA
SetPropA
LoadCursorFromFileW
SetActiveWindow
DlgDirSelectExA
EnumDesktopsA
DefMDIChildProcA
DestroyReasons
GetThreadDesktop
GetComboBoxInfo
UnregisterMessagePumpHook
ArrangeIconicWindows
GetWindowThreadProcessId
CreateAcceleratorTableA
GetMessagePos
GetCursorPos
CreateMDIWindowA
GetDlgItem
GetUpdateRect
SwitchToThisWindow
PeekMessageA
UnregisterClassA
PeekMessageA
GetReasonTitleFromReasonCode
DrawCaptionTempA
EnumDisplayMonitors
GetCapture
LoadIconA
OpenWindowStationA
CallMsgFilterA
UnregisterHotKey
DrawFrameControl
DefDlgProcA
CharUpperBuffA
DefMDIChildProcA
ToUnicode
CopyImage
DlgDirSelectExA
GetCursorPos
CloseWindowStation
GetWindowTextLengthW
OemToCharBuffA
DrawMenuBar
BlockInput
PaintDesktop
MapVirtualKeyExW
CharPrevExA
CreateIconFromResourceEx
SwapMouseButton
CreateDialogIndirectParamA
CloseDesktop
Tpxskigmsem
Winuvlt
GetHfdrqoq
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ