FfdYpvvdxuJgkqeuxJfqxQx
DrrOzvb
StquAiehPztqgumUg
Static task
static1
Behavioral task
behavioral1
Sample
2b4ebb04361933c75e130cc8b757e3df_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2b4ebb04361933c75e130cc8b757e3df_JaffaCakes118.exe
Resource
win10v2004-20240704-en
Target
2b4ebb04361933c75e130cc8b757e3df_JaffaCakes118
Size
140KB
MD5
2b4ebb04361933c75e130cc8b757e3df
SHA1
b7ad61aa77f49d4981580570e24be774a89e8a47
SHA256
40ec5d53d745304aae3aaa68567d6fe082b9d1ebc74d253a16480c5d4fa5ba21
SHA512
e6c0e61ee61b64845031140c39f7c796baaa4066ea97946fe4aebe2b4501057db1c6da3b903b197db5a51167c8ccbfa9163f9e934e58cd2a1754ab98a3c200fa
SSDEEP
3072:WUg1WqNqRI4eWhvmQrINoBONpr9r2Q7OJ0lq:Tg1VqOWhvmQGbNprQTJ0
Checks for missing Authenticode signature.
resource |
---|
2b4ebb04361933c75e130cc8b757e3df_JaffaCakes118 |
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
TerminateProcess
GetExitCodeProcess
ExitProcess
SetFileTime
TlsAlloc
SetConsoleMode
VirtualFree
SetFilePointer
GetSystemWindowsDirectoryW
LeaveCriticalSection
CreateMutexA
OutputDebugStringA
WritePrivateProfileStructA
LoadLibraryW
TlsGetValue
FormatMessageA
GetNumberFormatW
VirtualProtect
GetModuleHandleA
SetCurrentDirectoryA
WritePrivateProfileStructW
ResetEvent
ReadFile
SetCurrentDirectoryW
GetStringTypeA
GetProcAddress
LockResource
VirtualAlloc
__winitenv
__set_app_type
memcpy
labs
IsWindow
LoadCursorW
DrawEdge
CopyRect
CreateWindowExA
CallWindowProcW
GetClipboardData
GetForegroundWindow
wsprintfA
DispatchMessageW
SetStretchBltMode
BitBlt
SetTextColor
GetRegionData
CreateSolidBrush
SelectPalette
DeleteDC
DeleteObject
GetTextExtentPoint32W
GetStockObject
CreateRoundRectRgn
SetBkMode
CreateCompatibleBitmap
GetTextMetricsW
ExtTextOutW
CreateBitmap
LineTo
StretchBlt
TextOutW
lineAgentSpecific
lineMakeCallW
tapiGetLocationInfoW
lineGetCallInfoA
lineGetAddressCaps
FfdYpvvdxuJgkqeuxJfqxQx
DrrOzvb
StquAiehPztqgumUg
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ