Btgobb
Cthzj
Imicimvvme
Nmyc
Static task
static1
Behavioral task
behavioral1
Sample
5b904f673f1899adc27241bb30b3298b_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
5b904f673f1899adc27241bb30b3298b_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Target
5b904f673f1899adc27241bb30b3298b_JaffaCakes118
Size
140KB
MD5
5b904f673f1899adc27241bb30b3298b
SHA1
38866a1b32f6e60c4c8d7a64c93599e806a40bfb
SHA256
229b4580e646cd477df0cc2e9a27bee6653138dc4c30dc8bd397e7c2f2f96f37
SHA512
6e13883fbeabb0c098f783e4a1c050120a81bcc51dacd60427ca23f9f52285771aa851dbf764a302b58229e10f198ce994a14406ae0efd07bfa86cee0005372d
SSDEEP
3072:jOHuMd2zoHIUjUPe5WQG+VSVp3WhUxCt01FvL8EXk80nNEk:69ozNPewdGS24j8tTNE
Checks for missing Authenticode signature.
resource |
---|
5b904f673f1899adc27241bb30b3298b_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
CloseHandle
EnumResourceNamesA
ExitProcess
FreeResource
GetACP
GetCommandLineA
GetModuleHandleA
GetOEMCP
GetStartupInfoA
LocalAlloc
RtlUnwind
SetUnhandledExceptionFilter
SleepEx
TlsFree
TlsGetValue
TlsSetValue
WriteFile
lstrcpyA
lstrcpynA
lstrlenA
ToAscii
LoadImageA
IsCharUpperA
IsCharLowerA
EndPaint
EndDialog
EnableScrollBar
EmptyClipboard
DrawIcon
DrawCaption
DestroyMenu
CreateDesktopA
LsaEnumerateAccountRights
LsaGetUserName
LsaICLookupNames
LsaLookupNames
LsaLookupPrivilegeDisplayName
RegEnumKeyA
LsaCreateTrustedDomain
LsaCreateSecret
LsaCreateAccount
LsaDeleteTrustedDomain
__vbaCyForInit
__vbaCyAdd
__vbaCheckType
__vbaForEachAry
__vbaError
__vbaErase
__vbaDateVar
__vbaCySgn
__vbaCyMulI2
__vbaCyMul
__vbaCyI4
__vbaBoolStr
__vbaAryRebase1Var
__vbaAryLock
__vbaAryCopy
__vbaCyForNext
DirectInputCreateEx
DirectInputCreateW
DirectInputCreateA
Btgobb
Cthzj
Imicimvvme
Nmyc
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ