?MainOneFunc@@YGPAXKK@Z
?MainTwoFunc@@YGPAXKK@Z
Static task
static1
Behavioral task
behavioral1
Sample
4a24649a547af1dc5fefa8e65596fe18_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
4a24649a547af1dc5fefa8e65596fe18_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Target
4a24649a547af1dc5fefa8e65596fe18_JaffaCakes118
Size
96KB
MD5
4a24649a547af1dc5fefa8e65596fe18
SHA1
9020b56073ba43d47989d44f0593cbb0400de253
SHA256
f170d351cdcf9dec6195cba36640de9b4d8dac20ed23f1db6435c46282f9cb55
SHA512
505a15bcb3d0890fdff2344a01a543386a4811f58abd06abdaaa2aff5fc2979c89328efeb95e80517e0e866467191ea374121aaaed739c3f861a0b2f70124b59
SSDEEP
1536:aOckp/YnlRGnvkwVg46BBe/L/D5aLtkbL1+rDPDI0xl/ksqO+Cp4:aLOoqkIVsoWiXSTP/M
Checks for missing Authenticode signature.
resource |
---|
4a24649a547af1dc5fefa8e65596fe18_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
malloc
memset
_except_handler3
GetModuleBaseNameA
HeapFree
WaitForSingleObject
VirtualFree
OpenProcess
GlobalAlloc
TerminateThread
ReadProcessMemory
HeapDestroy
HeapCreate
CreateProcessA
TerminateProcess
VirtualAlloc
GlobalFree
OpenThread
MoveFileA
GetExitCodeThread
GetModuleFileNameA
GetModuleHandleA
CompareStringA
GetCurrentThreadId
WriteProcessMemory
SuspendThread
ResumeThread
GetCurrentProcess
CreateSemaphoreA
GetFileSize
ReleaseSemaphore
LoadLibraryA
CloseHandle
GetFullPathNameA
HeapAlloc
GetProcessHeap
CreateFileA
CreateWindowExA
InvalidateRect
GetScrollInfo
SetWindowLongA
GetMenu
GetForegroundWindow
SendMessageA
DrawIcon
GetWindowInfo
LoadIconA
ShowWindow
DestroyWindow
SetWindowTextA
UpdateWindow
SetScrollInfo
MoveWindow
GetActiveWindow
DrawTextA
GetDC
FindWindowA
GetWindowRect
PostMessageA
ModifyMenuA
ReleaseDC
BeginPath
EndPath
TextOutA
MoveToEx
BitBlt
LineTo
DeleteDC
SelectObject
CreateCompatibleDC
Polyline
CreatePen
GetPath
PolyDraw
?MainOneFunc@@YGPAXKK@Z
?MainTwoFunc@@YGPAXKK@Z
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ