FreeGlobalObjects
GetContextSpellingSession
GetNextToken
RunCssWordBreaker
Static task
static1
Behavioral task
behavioral1
Sample
2ef73d0f0ad4780bd54fdf6751dd28f0_JaffaCakes118.exe
Resource
win7-20240704-en
Target
2ef73d0f0ad4780bd54fdf6751dd28f0_JaffaCakes118
Size
309KB
MD5
2ef73d0f0ad4780bd54fdf6751dd28f0
SHA1
2da4f1a3bdfbd43ffd0ba6c00bdcc7ede7ed757e
SHA256
522d120e638e0abf4c98f09bf503c444ec90a51c3ac4acb786970dbfedfd2e55
SHA512
be88700d4493a1f5cfbb8a427542ee010b2e7b432b42bfbe6c237c50a81bc730af1755dc4c797f96297feb73265a0af16b7728310b3c4b6c07bc493830e89d24
SSDEEP
6144:HFZRJn6zwLdumQgLHjyadAouJTDEWPK8HPV+Wjv/HMuG/N94:w0bj1DEKQ/HMu894
Checks for missing Authenticode signature.
resource |
---|
2ef73d0f0ad4780bd54fdf6751dd28f0_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
SHFileOperationA
SHChangeNotify
SHCreateProcessAsUserW
RpcBindingFree
RpcBindingCopy
CoTaskMemFree
CoTaskMemAlloc
ImageRvaToSection
FindDebugInfoFile
FindFileInPath
ImagehlpApiVersion
VerQueryValueW
CloseClipboard
CloseDesktop
CharNextA
CloseWindow
CloseWindowStation
GetDC
GetKeyboardLayout
GetKeyboardLayoutList
GetMenuCheckMarkDimensions
GetMonitorInfoA
GetSysColor
GetSystemMetrics
ReleaseDC
CharPrevA
EnterCriticalSection
ExpandEnvironmentStringsW
FindClose
FindFirstFileW
FormatMessageW
FreeLibrary
GetCurrentProcess
GetCurrentProcessId
GetCurrentThread
GetCurrentThreadId
GetDiskFreeSpaceExW
GetFileAttributesW
GetFileType
GetLastError
GetLocalTime
GetModuleFileNameA
GetModuleFileNameW
GetModuleHandleA
GetModuleHandleW
GetProcAddress
GetProcessHeap
GetProcessTimes
GetShortPathNameA
GetStringTypeExW
GetSystemDefaultLCID
GetSystemDirectoryW
CloseHandle
GetSystemTimeAsFileTime
GetSystemWindowsDirectoryW
GetTempPathW
GetTickCount
GetTimeZoneInformation
GetUserDefaultLCID
GetVersion
GetVersionExA
GlobalAlloc
GlobalFree
GlobalMemoryStatus
HeapAlloc
HeapCreate
HeapDestroy
DeleteFileW
HeapLock
HeapReAlloc
HeapSize
HeapUnlock
InitializeCriticalSection
InterlockedCompareExchange
InterlockedExchange
IsDBCSLeadByte
IsDebuggerPresent
IsProcessorFeaturePresent
IsValidCodePage
IsValidLocale
LeaveCriticalSection
LoadLibraryA
LoadLibraryExW
LoadLibraryW
LocalAlloc
LocalFree
MultiByteToWideChar
OutputDebugStringA
QueryPerformanceCounter
RaiseException
ReleaseMutex
ReleaseSemaphore
RemoveDirectoryW
SetFileAttributesW
SetLastError
SetLocalTime
SetUnhandledExceptionFilter
Sleep
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
VirtualAlloc
VirtualFree
VirtualProtect
WaitForSingleObject
WideCharToMultiByte
WriteFile
DeleteCriticalSection
CreateSemaphoreA
CreateMutexA
CreateFileW
HeapFree
CreateDirectoryW
GetSystemInfo
CopySid
GetLengthSid
ConvertStringSecurityDescriptorToSecurityDescriptorW
ConvertSidToStringSidA
CheckTokenMembership
AllocateAndInitializeSid
AddAccessDeniedAce
AddAccessAllowedAce
UnregisterTraceGuids
TraceEvent
SetSecurityDescriptorDacl
RegisterTraceGuidsA
RegSetValueExW
RegSetValueExA
RegQueryValueExW
RegQueryValueExA
RegQueryInfoKeyW
RegOpenKeyExW
RegOpenKeyExA
RegEnumKeyW
RegCreateKeyExW
RegCloseKey
OpenThreadToken
InitializeSecurityDescriptor
InitializeAcl
GetTraceLoggerHandle
GetTraceEnableLevel
GetTokenInformation
GetSecurityDescriptorDacl
FreeSid
ChrCmpIA
PathFileExistsA
StrCmpNA
StrChrA
DeleteObject
DeleteDC
CreateSolidBrush
CreateDCA
GetDeviceCaps
ord9
FreeGlobalObjects
GetContextSpellingSession
GetNextToken
RunCssWordBreaker
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ