KmmbTobyhhTytqsGf
BxsUoytkpPsl
TanudMqnek
Static task
static1
Behavioral task
behavioral1
Sample
49aa1961f26e9a48f5d943636563eb87_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
49aa1961f26e9a48f5d943636563eb87_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Target
49aa1961f26e9a48f5d943636563eb87_JaffaCakes118
Size
119KB
MD5
49aa1961f26e9a48f5d943636563eb87
SHA1
c01eb7f57cfddcc5de8a682c6c0be0938f848a12
SHA256
d0d2eb6e777a9f2b2dfb8886c36beb98973ac131cbddaf184a5970be12c8e6f8
SHA512
83969c8d2c9b4cf0b8ab52e62b74a9f161145cea720ec5d028bf9f2f50fa8d79848730875388941bbe2206fdcd432989986a167d68e6bb70b62638ede0fced39
SSDEEP
3072:t6/P2tbyRKvKLo0Zkyri/8LDwJQrPcfcH+:Q/ehZ7W/H
Checks for missing Authenticode signature.
resource |
---|
49aa1961f26e9a48f5d943636563eb87_JaffaCakes118 |
IMAGE_DLLCHARACTERISTICS_WDM_DRIVER
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
VirtualFree
VirtualProtect
GetWindowsDirectoryA
_lclose
FreeLibrary
HeapAlloc
ExitThread
FindFirstFileW
GetLastError
GetStringTypeW
WriteConsoleW
CallNamedPipeW
OutputDebugStringA
GetCurrentProcess
CallNamedPipeA
GetProcAddress
GetModuleHandleA
CreateHardLinkA
VirtualAlloc
LoadLibraryW
DeleteAtom
lstrlenA
_exit
_iob
_except_handler3
strncpy
_wtol
swprintf
wcscat
_purecall
_controlfp
_vsnprintf
_snwprintf
isalpha
wcscpy
isdigit
__initenv
__CxxFrameHandler
wcscmp
_ftol
_c_exit
__dllonexit
_wcmdln
malloc
swscanf
wcschr
__p__fmode
_adjust_fdiv
free
__winitenv
memcpy
_cexit
__p__commode
wcslen
GetProcessWindowStation
ReleaseDC
LoadImageW
GetCursorPos
MapWindowPoints
CopyRect
SetCapture
DispatchMessageW
LoadCursorW
DestroyWindow
SetScrollPos
DialogBoxParamA
RegisterClassA
GetParent
LoadCursorA
wsprintfW
SendMessageA
ClientToScreen
LoadMenuW
ReleaseCapture
CheckDlgButton
BeginPaint
ScreenToClient
IsWindow
SendMessageW
GetMenuItemCount
UnregisterClassW
SHGetFolderPathW
SHGetFileInfoW
SHGetPathFromIDListW
ShellExecuteW
wglShareLists
glColor4i
glTexCoord2d
GlmfBeginGlsBlock
glColor4f
glColor3ui
glColor4d
glStencilMask
glFogfv
glTexCoord2dv
KmmbTobyhhTytqsGf
BxsUoytkpPsl
TanudMqnek
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ