@Lh5unit@Finalization$qqrv
@Lh5unit@LHACompress$qqrp15Classes@TStreamt1
@Lh5unit@LHAExpand$qqrp15Classes@TStreamt1
@Lh5unit@initialization$qqrv
@WndProc$qqsp6HWND__uiuil
__GetExceptDLLinfo
___CPPdebugHook
Static task
static1
Behavioral task
behavioral1
Sample
2e9991bf617e51ae3a648a192c1ceafd_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2e9991bf617e51ae3a648a192c1ceafd_JaffaCakes118.exe
Resource
win10v2004-20240704-en
Target
2e9991bf617e51ae3a648a192c1ceafd_JaffaCakes118
Size
968KB
MD5
2e9991bf617e51ae3a648a192c1ceafd
SHA1
3a402645e5a6a61d0f4cd295003956f0647c3150
SHA256
f2739c8bb134c0ecb316369272bef9927518105bd9903781c9c80eacbc9be376
SHA512
7c3a089215f16edf81523c8681ac09c3e56dd9a872ed6b1553c6ac477f4a2a8d1e1a8b00130f690724db4a40fabf26c9e5ac7bdfbfe71a5e0bced86438646584
SSDEEP
24576:Jx9eMjkEHiQGmK9o+SNtD/1pzORHnjTnU13BF:kWjHiQLhtL1pz0HnjA13r
Checks for missing Authenticode signature.
resource |
---|
2e9991bf617e51ae3a648a192c1ceafd_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
CloseHandle
CompareStringA
CreateEventA
CreateFileA
CreateFileMappingA
CreateProcessA
DeleteCriticalSection
DeleteFileA
DosDateTimeToFileTime
EnterCriticalSection
EnumCalendarInfoA
ExitProcess
FileTimeToDosDateTime
FileTimeToLocalFileTime
FindClose
FindFirstFileA
FormatMessageA
FreeLibrary
GetACP
GetCPInfo
GetCommandLineA
GetCurrentProcess
GetCurrentThreadId
GetDiskFreeSpaceA
GetEnvironmentStrings
GetFileSize
GetFileType
GetLastError
GetLocalTime
GetLocaleInfoA
GetModuleFileNameA
GetModuleHandleA
GetOEMCP
GetProcAddress
GetProcessHeap
GetShortPathNameA
GetStartupInfoA
GetStdHandle
GetStringTypeExA
GetStringTypeW
GetTempPathA
GetThreadLocale
GetVersion
GetVersionExA
GetWindowsDirectoryA
GlobalAlloc
GlobalFree
GlobalHandle
GlobalLock
GlobalMemoryStatus
GlobalReAlloc
GlobalUnlock
HeapAlloc
HeapFree
InitializeCriticalSection
InterlockedDecrement
InterlockedIncrement
LeaveCriticalSection
LoadLibraryA
LoadLibraryExA
LocalAlloc
LocalFileTimeToFileTime
LocalFree
MapViewOfFile
MultiByteToWideChar
RaiseException
ReadFile
ReadProcessMemory
ResetEvent
ResumeThread
RtlUnwind
SetConsoleCtrlHandler
SetCurrentDirectoryA
SetEndOfFile
SetEvent
SetFileAttributesA
SetFilePointer
SetFileTime
SetHandleCount
Sleep
TerminateProcess
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
UnmapViewOfFile
VirtualAlloc
VirtualFree
VirtualQuery
WaitForSingleObject
WideCharToMultiByte
WriteFile
WriteProcessMemory
lstrcpynA
lstrlenA
CreateFontIndirectA
AppendMenuA
CharLowerBuffA
CharNextA
CreateWindowExA
DefWindowProcA
DispatchMessageA
EnumThreadWindows
GetDlgItem
GetDlgItemTextA
GetKeyboardType
GetMessageA
GetSystemMenu
GetSystemMetrics
GetWindowLongA
LoadCursorA
LoadIconA
LoadStringA
MessageBoxA
PostMessageA
PostQuitMessage
RegisterClassA
SendMessageA
SetFocus
SetWindowLongA
ShowWindow
TranslateMessage
wsprintfA
SafeArrayCreate
SafeArrayGetElement
SafeArrayGetLBound
SafeArrayGetUBound
SafeArrayPtrOfIndex
SafeArrayPutElement
SafeArrayRedim
SysAllocStringLen
SysFreeString
SysReAllocStringLen
VarBoolFromStr
VarBstrFromBool
VarBstrFromCy
VarBstrFromDate
VarCyFromStr
VarDateFromStr
VarI4FromStr
VarNeg
VarNot
VarR8FromStr
VariantChangeTypeEx
VariantClear
VariantCopy
VariantCopyInd
VariantInit
@Lh5unit@Finalization$qqrv
@Lh5unit@LHACompress$qqrp15Classes@TStreamt1
@Lh5unit@LHAExpand$qqrp15Classes@TStreamt1
@Lh5unit@initialization$qqrv
@WndProc$qqsp6HWND__uiuil
__GetExceptDLLinfo
___CPPdebugHook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE