_SjSc_zdu_zaY@8
_ModifyRegistry@8
_GnT_vwbz_rmfqys@4
_CwJha_rfmq_Vpn_y@4
_SaveRegistry@12
Static task
static1
Behavioral task
behavioral1
Sample
1925b7008cbd8321f53f9fb98fe7734f_JaffaCakes118.exe
Resource
win7-20240611-en
Target
1925b7008cbd8321f53f9fb98fe7734f_JaffaCakes118
Size
2.4MB
MD5
1925b7008cbd8321f53f9fb98fe7734f
SHA1
f1f78248357d8e3ed56f2a417103ffefb93361bf
SHA256
9284d5792e3532b660269d67a8869c528562ee3f57c815e3a3b65badc1046594
SHA512
348be8c929d1149de37fac2c72bcc1854dafc43b450350d902bc97906523f34178e84aabd5fecea4f2377907cb42e06d5f84994ac76317758cd2cfbc3e48ea02
SSDEEP
49152:P4FvHJQ9lM2oHPzRGeW5jlX9YOGWw/IXGZb5LEH+92E:PYPJQwrH7FSijnPEe92E
Checks for missing Authenticode signature.
resource |
---|
1925b7008cbd8321f53f9fb98fe7734f_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
FindResourceA
GetLastError
GlobalFindAtomW
GetCommTimeouts
GetTempFileNameW
GetDriveTypeW
HeapLock
GetUserDefaultUILanguage
ClearCommError
GetCurrentThread
MulDiv
GetModuleHandleA
GetStdHandle
LoadLibraryExW
SetThreadAffinityMask
ConvertDefaultLocale
CreateWaitableTimerA
LoadLibraryA
SetEvent
GetLocalTime
HeapSize
FileTimeToLocalFileTime
SleepEx
GetStartupInfoW
GetCurrentProcessId
SetUnhandledExceptionFilter
GetNumberFormatA
GetTimeFormatW
VirtualQuery
MoveFileExW
GetThreadContext
GetPriorityClass
IsDBCSLeadByteEx
HeapWalk
EnumResourceNamesW
FindFirstFileW
HeapReAlloc
lstrcmpA
GetCommandLineW
DuplicateHandle
CreateWaitableTimerW
CreateDirectoryA
GlobalMemoryStatusEx
lstrlenW
TransactNamedPipe
SetCurrentDirectoryA
GetVersion
lstrcatA
GetSystemTime
WaitForSingleObject
VirtualLock
GetCommState
GetCPInfo
GetTickCount
FindCloseChangeNotification
WriteProfileSectionA
SetPropW
BringWindowToTop
RemoveMenu
CopyRect
DrawTextExW
InsertMenuW
GetMenuItemCount
LookupIconIdFromDirectory
SetWindowLongA
DefWindowProcW
MapVirtualKeyA
GetWindowContextHelpId
FindWindowExW
DestroyCaret
LoadMenuIndirectA
AttachThreadInput
EnumChildWindows
PeekMessageA
GetUpdateRect
MapVirtualKeyExW
FindWindowW
TabbedTextOutW
GetKBCodePage
DefMDIChildProcW
SwitchToThisWindow
DialogBoxParamA
AppendMenuA
AdjustWindowRect
InsertMenuItemW
LoadAcceleratorsA
ValidateRgn
InvalidateRgn
ChangeMenuW
BeginPaint
SetWindowContextHelpId
ArrangeIconicWindows
GetScrollPos
SetMenuItemBitmaps
MapDialogRect
IsCharAlphaNumericW
IsMenu
GetWindowPlacement
GetScrollInfo
SetSysColors
GetMenuState
SetTimer
LoadStringA
SwapMouseButton
IsDialogMessageW
CreateMenu
OemToCharBuffA
MBToWCSEx
GetSubMenu
TileChildWindows
GetPropA
CreateAcceleratorTableW
ExtTextOutA
CreateCompatibleBitmap
OffsetViewportOrgEx
SetWindowExtEx
GetCurrentObject
CreateRoundRectRgn
GetDeviceCaps
DeleteDC
RectVisible
GetCharWidthA
CreateSolidBrush
Polygon
CreateHatchBrush
CreateICW
GetViewportOrgEx
CreateCompatibleDC
SetDIBitsToDevice
SelectClipRgn
DeleteMetaFile
GetTextExtentExPointW
SetBkColor
GetMiterLimit
UnrealizeObject
OffsetRgn
SetTextJustification
SymGetSymFromAddr
SymGetModuleInfoW
SymCleanup
SymSetSearchPath
GetTimestampForLoadedLibrary
CryptProtectData
CertFindCertificateInStore
CertCloseStore
CertFreeCertificateContext
CryptHashPublicKeyInfo
srand
rand
memset
CommandLineToArgvW
_SjSc_zdu_zaY@8
_ModifyRegistry@8
_GnT_vwbz_rmfqys@4
_CwJha_rfmq_Vpn_y@4
_SaveRegistry@12
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ