LzRsnjaUtxyfdUilbpnBwr
PyXnlzdnUgaeWiucgpsMl
DpqidMcqaHavbZo
CrCarcmcBejzjyvGf
Static task
static1
Behavioral task
behavioral1
Sample
347f5e82ef100778183f164ca77c2c97_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
347f5e82ef100778183f164ca77c2c97_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Target
347f5e82ef100778183f164ca77c2c97_JaffaCakes118
Size
79KB
MD5
347f5e82ef100778183f164ca77c2c97
SHA1
c8364b122bcbf0a7565bec03476ed64ec439ffab
SHA256
ea1d292d173dce0e9c81b742452449ba4350bd37f6864e792388f25da1123b56
SHA512
02efea6fa73ee044b53b0eb74b683e24067510d2cf30d7842035f3974d1e2df7f3632f20c2a1ceb50289e04e432dcc1fcdd7968ee7987931f4d1549b5dca9951
SSDEEP
1536:z/rjgIh4LBRmTmjiFCxZfgg275W8gNKEAqCBekDVtWq7nXoX:7ngDuzFQ475wKEApB7EgXoX
Checks for missing Authenticode signature.
resource |
---|
347f5e82ef100778183f164ca77c2c97_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetModuleHandleA
DosDateTimeToFileTime
TryEnterCriticalSection
ReadFileEx
GetStdHandle
GetStringTypeA
VirtualAlloc
GetProcAddress
GlobalHandle
ExitProcess
GetFileAttributesExA
CreateJobObjectA
LoadLibraryA
LoadResource
DuplicateHandle
CreateFileA
GetLastError
VirtualProtect
GetModuleHandleW
FindResourceW
ResetEvent
GetProfileSectionW
MapViewOfFileEx
is_wctype
fgetpos
_y1
_wstati64
_mbstrlen
memset
__p__winver
memcpy
__lc_handle
isspace
_CIlog
__unDNameEx
_telli64
_sopen
_strtime
_isnan
isalnum
_wpopen
iswctype
_cscanf
__STRINGTOLD
ispunct
?raw_name@type_info@@QBEPBDXZ
_nextafter
isupper
ctime
InvalidateRect
EnableMenuItem
GetNextDlgTabItem
DialogBoxParamW
LoadStringW
MoveWindow
CheckRadioButton
TranslateAcceleratorW
GetClassNameW
SetWindowPlacement
FindWindowW
ModifyMenuW
LoadStringA
PrivateExtractIconsW
glGetTexLevelParameterfv
glPixelZoom
glTexCoord1dv
glIndexub
glNormalPointer
glMap1f
glTexParameteri
glRasterPos4sv
glCopyPixels
glTexGeniv
glPolygonMode
glFlush
glInterleavedArrays
glColor3fv
glRectf
glRotated
LzRsnjaUtxyfdUilbpnBwr
PyXnlzdnUgaeWiucgpsMl
DpqidMcqaHavbZo
CrCarcmcBejzjyvGf
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ