?SetMegaFunction@@YGPAXKKK@Z
?SetSuperFunction@@YGPAXKKKK@Z
Static task
static1
Behavioral task
behavioral1
Sample
3d171da0143b98fca9aca43a9ee633d1_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3d171da0143b98fca9aca43a9ee633d1_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Target
3d171da0143b98fca9aca43a9ee633d1_JaffaCakes118
Size
95KB
MD5
3d171da0143b98fca9aca43a9ee633d1
SHA1
24fb23b4160ab1967a18a61c2616d1378e58acde
SHA256
efe6a1fb99c44c18945fd008532c441f90898ab924972953ab390758e6ef878f
SHA512
f4dfc3fd0055347ee6bb289e294757bbad419382635fc8f78b2be95982fe24e78f43c30d5a0316669c5a4a01f97bbbf707190e644f5f55fc1cc1d1e26f50c985
SSDEEP
1536:VcZ3cku4trTutpEUiUCpuk+Ln6FI3gn5astqktjXLAK4CatIW7LkiA5M6:ItTtrTuAjpujn/3avqYjsK49ttLVA5
Checks for missing Authenticode signature.
resource |
---|
3d171da0143b98fca9aca43a9ee633d1_JaffaCakes118 |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
InternetOpenA
InternetOpenUrlA
CloseHandle
HeapAlloc
GetProcessHeap
GetCurrentProcess
HeapFree
WaitForSingleObject
OpenProcess
GlobalAlloc
LoadLibraryA
ReadProcessMemory
HeapDestroy
HeapCreate
ReadFile
GlobalFree
OpenThread
MoveFileA
GetExitCodeThread
CompareStringA
GetCurrentThreadId
WriteProcessMemory
SuspendThread
ReleaseSemaphore
CreateSemaphoreA
TerminateThread
GetActiveWindow
DrawTextA
MoveWindow
ModifyMenuA
UpdateWindow
PostMessageA
ShowWindow
InvalidateRect
SetWindowLongA
GetMenu
GetForegroundWindow
SendMessageA
DrawIcon
GetWindowInfo
LoadIconA
GetWindowRect
ReleaseDC
FindWindowA
GetDC
BitBlt
LineTo
SelectObject
DeleteDC
CreateCompatibleDC
memset
?SetMegaFunction@@YGPAXKKK@Z
?SetSuperFunction@@YGPAXKKKK@Z
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ