?MainOneFunc@@YGPAXKK@Z
?MainTwoFunc@@YGPAXKK@Z
Static task
static1
Behavioral task
behavioral1
Sample
23324ba5e6b83c19eecab6d64cca57bc_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
23324ba5e6b83c19eecab6d64cca57bc_JaffaCakes118.exe
Resource
win10v2004-20240611-en
Target
23324ba5e6b83c19eecab6d64cca57bc_JaffaCakes118
Size
96KB
MD5
23324ba5e6b83c19eecab6d64cca57bc
SHA1
975dcc4fde8f1fcc40b4d9381f9f0031ddf147e5
SHA256
0e0c615c55a1a3f335cc044ce66d660ff0bdb455be2f10ebd83394407e7e5d6c
SHA512
07fad9e43f725dc1a502e694aaa53a393d10c2f4468016ccb88729f965e816945f82942e7222e611a8d8ae08ed83c10e4df8fbd4c07c3932f050a7d2909e2af0
SSDEEP
1536:QcB7ejrKPNexjOfjpziQkL/Nm+UmUapAwZZs379jwqeGdgGf6kOsyetKLe:Qc0HjOfjpziQMm+UfapAwZZY9HeXGf6n
Checks for missing Authenticode signature.
resource |
---|
23324ba5e6b83c19eecab6d64cca57bc_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
malloc
memset
_except_handler3
GetModuleBaseNameA
GetProcessHeap
OpenProcess
GlobalAlloc
TerminateThread
ReadProcessMemory
CreateProcessA
TerminateProcess
VirtualAlloc
GlobalFree
OpenThread
MoveFileA
GetExitCodeThread
GetModuleFileNameA
GetModuleHandleA
CompareStringA
GetCurrentThreadId
CloseHandle
WriteProcessMemory
SuspendThread
ResumeThread
VirtualFree
GetCurrentProcess
CreateSemaphoreA
WaitForSingleObject
ReleaseSemaphore
CreateFileA
GetFileSize
HeapAlloc
VirtualQuery
HeapFree
PostMessageA
ShowWindow
CreateWindowExA
InvalidateRect
GetScrollInfo
SetWindowLongA
GetMenu
GetForegroundWindow
SendMessageA
DrawIcon
GetWindowRect
DestroyWindow
SetWindowTextA
UpdateWindow
SetScrollInfo
ModifyMenuA
GetActiveWindow
DrawTextA
GetWindowInfo
ReleaseDC
SetWindowPos
MoveWindow
FindWindowA
GetDC
BeginPath
EndPath
TextOutA
MoveToEx
BitBlt
LineTo
DeleteDC
SelectObject
CreateCompatibleDC
Polyline
CreatePen
GetPath
PolyDraw
?MainOneFunc@@YGPAXKK@Z
?MainTwoFunc@@YGPAXKK@Z
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ