Ft
Hto
Tevkno
Static task
static1
Behavioral task
behavioral1
Sample
2717f18324444b12a8ee56011c5e38a8_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2717f18324444b12a8ee56011c5e38a8_JaffaCakes118.exe
Resource
win10v2004-20240704-en
Target
2717f18324444b12a8ee56011c5e38a8_JaffaCakes118
Size
116KB
MD5
2717f18324444b12a8ee56011c5e38a8
SHA1
93580cf7cc52b1e8b8f1ed43c0ba101a9db0d5ec
SHA256
db104119a1e40a6f1c5b2a64203c526319b8c047097dad1adebe8a325400e342
SHA512
a8a31015a5b2fc602e35c0ad9ea7c504cd73334fc380abedd3a1d3377bcf0920e087bc9a42b4031846ec7986e040d7e804fe10c6172447da92ba5b9621471889
SSDEEP
3072:CjrOxeiixXp+ULTy+1hUt/nnGK7h/X+zH4W+W:p5ULTh1hUtRc+
Checks for missing Authenticode signature.
resource |
---|
2717f18324444b12a8ee56011c5e38a8_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
CloseHandle
CompareStringA
ExitProcess
GetACP
GetCommandLineA
GetModuleHandleA
GetOEMCP
GetPrivateProfileStringA
GetStartupInfoA
GetSystemTime
HeapAlloc
RtlUnwind
SetEndOfFile
SetLastError
SetUnhandledExceptionFilter
TlsFree
UnmapViewOfFile
VirtualFree
lstrcatA
lstrcpyA
ToAscii
ShowOwnedPopups
OemToCharBuffA
LoadAcceleratorsW
GetFocus
EndDeferWindowPos
EnableWindow
DestroyIcon
CharPrevA
GetWindowTextA
LsaEnumerateTrustedDomains
LsaGetQuotasForAccount
LsaGetRemoteUserName
LsaLookupNames
LsaLookupPrivilegeDisplayName
__vbaCyStr
__vbaCyInt
__vbaCyAbs
__vbaExitEachVar
__vbaAryConstruct2
__vbaExitEachColl
__vbaExitEachAry
__vbaEraseKeepData
__vbaDateVar
__vbaCyVar
DirectInputCreateA
DirectInputCreateEx
DirectInputCreateW
Ft
Hto
Tevkno
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ