?Exfit2@@YAKKK@Z
?Exfit@@YAKKK@Z
Static task
static1
Behavioral task
behavioral1
Sample
2dacfb58cddea6ef63030075979de15e_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2dacfb58cddea6ef63030075979de15e_JaffaCakes118.exe
Resource
win10v2004-20240704-en
Target
2dacfb58cddea6ef63030075979de15e_JaffaCakes118
Size
448KB
MD5
2dacfb58cddea6ef63030075979de15e
SHA1
f1c31b4c1bd34cee4bd5cbbcf0742226dfce6095
SHA256
e3a9daa4c65eea2d9db61eef852d102067b99ed34e4dcb5475b780ed46c45887
SHA512
a73896a391cb0492964be74114cdd73fb847f93728a0c86f5e7befc9acb95e34df58fe1af6e4759b48bb55d4583370f19b93f4b558d7e63110abdee4c11d7a2e
SSDEEP
12288:accjfn0pGufmL5MZZWyan1sVsz/YM5m+J6t5tz:DcjILmLOLWtn1r5hEtD
Checks for missing Authenticode signature.
resource |
---|
2dacfb58cddea6ef63030075979de15e_JaffaCakes118 |
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetTickCount
WriteFile
SetEvent
Sleep
GetProcAddress
GetLastError
VirtualAlloc
ResetEvent
FlushFileBuffers
SetStdHandle
LCMapStringW
LCMapStringA
SetFilePointer
GetOEMCP
GetACP
GetCPInfo
GetStringTypeW
GetStringTypeA
MultiByteToWideChar
IsBadWritePtr
IsBadReadPtr
HeapValidate
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
ExitProcess
HeapAlloc
DebugBreak
GetStdHandle
InterlockedDecrement
OutputDebugStringA
LoadLibraryA
InterlockedIncrement
GetModuleFileNameA
HeapReAlloc
HeapFree
HeapDestroy
HeapCreate
VirtualFree
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetFileType
RtlUnwind
CloseHandle
ShowWindow
LoadStringA
SetFocus
FindWindowA
GetActiveWindow
LoadIconA
joyGetPosEx
mixerClose
joyGetDevCapsA
joySetThreshold
?Exfit2@@YAKKK@Z
?Exfit@@YAKKK@Z
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ