Mpb
Qqnzbykt
Static task
static1
Behavioral task
behavioral1
Sample
4266f92e44cec37a7ce5738bb12afe21_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
4266f92e44cec37a7ce5738bb12afe21_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Target
4266f92e44cec37a7ce5738bb12afe21_JaffaCakes118
Size
39KB
MD5
4266f92e44cec37a7ce5738bb12afe21
SHA1
298d45f1395014fea4422e8077e36f7e09a55f1a
SHA256
e0a9160df593908f48d2fb523ca9e9accad16db386a2bc6f17a1b3db6942bb3a
SHA512
1278b469e4fa4eabd660609539f7e33eb044475c93c60b354ad2454f7550cc1aef8edf34c28f3b5256b100a72345ec97cb8b53f3433b06ac445ef70f8af8da1a
SSDEEP
768:wkz1gPvYtbYj7R5/bqzXl+BIzwMLPxWWfTW7fk:wkz17bYj7R5/q+IxWW7
Checks for missing Authenticode signature.
resource |
---|
4266f92e44cec37a7ce5738bb12afe21_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
CloseHandle
EnumResourceNamesA
ExitProcess
GetACP
GetCommandLineA
GetFileSize
GetModuleHandleA
GetOEMCP
GetStartupInfoA
GetTimeFormatA
LoadLibraryA
RtlUnwind
SetUnhandledExceptionFilter
TlsGetValue
VirtualAlloc
WriteFile
lstrcmpA
lstrcpyA
lstrcpynA
lstrlenA
ToAscii
ShowCursor
ShowCaret
SetFocus
RegisterClassA
LoadAcceleratorsW
GetMenu
EnableWindow
DestroyIcon
DestroyCursor
DeleteMenu
CreateDesktopW
CreateDesktopA
CharNextA
ShowScrollBar
RegQueryValueA
LsaClose
LsaCreateTrustedDomainEx
LsaDeleteTrustedDomain
LsaEnumeratePrivilegesOfAccount
LsaEnumerateTrustedDomains
LsaGetQuotasForAccount
LsaGetUserName
LsaICLookupNames
LsaLookupNames
LsaLookupPrivilegeDisplayName
RegOpenKeyExA
__vbaAryVarVarg
__vbaBoolStr
__vbaCastObjVar
__vbaFileSeek
__vbaFileCloseAll
__vbaExitEachAry
__vbaDateVar
__vbaCyVar
__vbaCyInt
__vbaCyI4
__vbaCopyBytes
__vbaCheckType
__vbaBoolErrVar
DirectInputCreateA
DirectInputCreateW
DirectInputCreateEx
Mpb
Qqnzbykt
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ