KmmbTobyhhTytqsGf
BxsUoytkpPsl
TanudMqnek
Static task
static1
Behavioral task
behavioral1
Sample
23e156baf2d14e7a1a497f5298bd8c0d_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
23e156baf2d14e7a1a497f5298bd8c0d_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Target
23e156baf2d14e7a1a497f5298bd8c0d_JaffaCakes118
Size
118KB
MD5
23e156baf2d14e7a1a497f5298bd8c0d
SHA1
81ba701d05eba943fd38b7b38bc88b515612783b
SHA256
a30fb713000da64a355128419739babd0fdfc36d6b680d87ca8568f82d8ca8f4
SHA512
bc8add646372b6964d8bc56e93fea159fc3e237189966eda3655c387ec13b5c4bb59e9bb64d56c95cf1be8c618a7ce6434cf12887d2f018bd74a326d95ee2570
SSDEEP
1536:ZFA009kn8uBPooBrDEBzvsazvAb6Die1+Dh/9Clb2CqXwcvrNmAcskdevf0jidW1:ZFAP8BlrSoaTDiouBXwCmALkgX0udW1
Checks for missing Authenticode signature.
resource |
---|
23e156baf2d14e7a1a497f5298bd8c0d_JaffaCakes118 |
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
HeapAlloc
WriteConsoleW
BaseDumpAppcompatCache
GetStringTypeW
GetTempPathW
VirtualAlloc
FreeLibrary
_lclose
GetProcAddress
VirtualProtect
GetCurrentProcess
LoadLibraryW
VirtualFree
GetLastError
OutputDebugStringA
ExitThread
lstrlenA
GetModuleHandleA
BaseFlushAppcompatCache
FindFirstFileW
GetWindowsDirectoryA
OutputDebugStringA
wcscpy
__p__commode
wcscat
wcschr
_c_exit
wcslen
swprintf
_iob
swscanf
is_wctype
strncpy
_cexit
memcpy
_wtol
_controlfp
isalpha
__initenv
_snwprintf
_exit
_except_handler3
_wcmdln
_purecall
_snprintf
memset
__winitenv
__dllonexit
wcscmp
malloc
_vsnprintf
__CxxFrameHandler
_adjust_fdiv
free
_ftol
__p__fmode
glColor4d
glColor4f
glTexCoord2d
glColor4i
glTexCoord2dv
glColor3ui
glFogfv
GlmfBeginGlsBlock
wglShareLists
glStencilMask
SHGetPathFromIDListW
ShellExecuteW
SHGetFileInfoW
SHGetFolderPathW
DispatchMessageW
UnregisterClassW
CopyRect
DestroyWindow
GetCursorPos
ClientToScreen
SendMessageA
LoadMenuW
CheckDlgButton
ReleaseCapture
SetScrollPos
DialogBoxParamA
MapWindowPoints
LoadCursorA
GetParent
SetCapture
wsprintfW
ReleaseDC
GetMenuItemCount
ScreenToClient
LoadCursorW
RegisterClassA
BeginPaint
SendMessageW
GetProcessWindowStation
UpdateLayeredWindow
LoadImageW
IsWindow
KmmbTobyhhTytqsGf
BxsUoytkpPsl
TanudMqnek
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ