?PenExA@@YGXIJPAF*Z
?IsTime@@YGEDHPAMF*Z
?PutDeviceEx@@YGIPAIPAG*Z
?ValidateTextOriginal@@YGM_NPAHK*Z
?FormatSystemExW@@YGPAKNPAN*Z
?FindNameOld@@YGMFGGD*Z
?InvalidateListExA@@YGDEDD*Z
Static task
static1
Behavioral task
behavioral1
Sample
384bd77b20749f7b3bb1cb8618b6ad20_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
384bd77b20749f7b3bb1cb8618b6ad20_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Target
384bd77b20749f7b3bb1cb8618b6ad20_JaffaCakes118
Size
157KB
MD5
384bd77b20749f7b3bb1cb8618b6ad20
SHA1
55ce0ca15b0f826fe2bf13f7899e8f7d2a9272d5
SHA256
02cdc6f52238d7a7852d87dec965db0c746413546236aa87143b8e4f53ccd979
SHA512
2229563c543db16f2ad459f4aac8d9ddf807769bde576cf16372d6a2ee9a45bca825f422b9cad4e6de3acfac467c02d70f057939f29ecc1bf114ada4536ceb01
SSDEEP
3072:aVoOjBsJ0LX1OTTUv1DdnDsJUe6eH6PG:0l4nUthnDPe9H6
Checks for missing Authenticode signature.
resource |
---|
384bd77b20749f7b3bb1cb8618b6ad20_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
SetWindowPlacement
MoveWindow
MapWindowPoints
CreateMenu
GetSysColorBrush
GetWindowTextLengthW
GetClassLongA
OemToCharBuffA
AppendMenuA
ReplyMessage
GetDC
GetKeyboardType
GetMessageExtraInfo
LockWindowUpdate
SetMenuDefaultItem
MapDialogRect
GetMenuItemRect
EqualRect
SetDlgItemTextW
MapVirtualKeyExW
MapVirtualKeyW
GetForegroundWindow
EnumChildWindows
IsWindow
CreateWindowExA
BringWindowToTop
DestroyMenu
ChildWindowFromPointEx
CharPrevA
FindWindowW
OemToCharA
DefFrameProcW
GetMenuStringW
HiliteMenuItem
EnableMenuItem
SendMessageTimeoutA
keybd_event
AdjustWindowRectEx
OffsetRect
DispatchMessageA
RedrawWindow
DrawFrameControl
SetScrollRange
SetActiveWindow
PropertySheetA
ImageList_GetImageCount
ImageList_AddMasked
ImageList_Create
ImageList_GetIconSize
Rectangle
CreateFontW
CreateDCW
BeginPath
StartDocW
GetBkMode
GetTextExtentPointW
CreateHatchBrush
DeleteObject
CreatePatternBrush
CreateRectRgnIndirect
RemoveFontResourceW
SetPixel
OffsetViewportOrgEx
CreateFontIndirectW
AddFontResourceW
GetNearestPaletteIndex
_controlfp
clearerr
getenv
__set_app_type
strncmp
__p__fmode
__p__commode
system
_amsg_exit
_initterm
printf
strcoll
_acmdln
exit
_ismbblead
atoi
_XcptFilter
clock
_exit
strchr
fputc
_cexit
free
sscanf
strpbrk
__setusermatherr
__getmainargs
ChooseFontW
PrintDlgExW
FindTextW
StrNCatW
StrToIntA
PathRemoveBlanksW
GetACP
FindResourceExA
GetProcessHeap
LocalSize
FindFirstFileA
DeviceIoControl
GlobalAlloc
TransactNamedPipe
OpenEventA
GetTempFileNameA
GetModuleHandleA
OpenSemaphoreW
SetErrorMode
VirtualProtect
GetSystemDirectoryA
EnumResourceTypesA
IsValidLanguageGroup
HeapAlloc
MoveFileExW
OpenFileMappingW
LoadResource
HeapFree
GetComputerNameExW
?PenExA@@YGXIJPAF*Z
?IsTime@@YGEDHPAMF*Z
?PutDeviceEx@@YGIPAIPAG*Z
?ValidateTextOriginal@@YGM_NPAHK*Z
?FormatSystemExW@@YGPAKNPAN*Z
?FindNameOld@@YGMFGGD*Z
?InvalidateListExA@@YGDEDD*Z
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ