?SetMegaFunction@@YGPAXKKK@Z
?SetSuperFunction@@YGPAXKKKK@Z
Static task
static1
Behavioral task
behavioral1
Sample
61decd5fed8472e535562f8094a334fb_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
61decd5fed8472e535562f8094a334fb_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Target
61decd5fed8472e535562f8094a334fb_JaffaCakes118
Size
95KB
MD5
61decd5fed8472e535562f8094a334fb
SHA1
f87acc4961dbb7773eed452b3a88ba5e125cab9f
SHA256
ed3a59dc97df99bf5b131a1bba9c47a8da2fe835e7bfe0e531db83282dea4301
SHA512
ccd20fd0696e7bbc02af26faf8eb2c9e84610a9a1e09aff5651c8b459dca2195275699d5ff645fd4850edb59b5335fcea3442e9a5d1e3bb86d73db7d0a2adbff
SSDEEP
1536:rcZ3tkj4trT1tpEUiUTJzsoXVNkSNmD3fbnxdGeYEk6yIW7LkiA5M6:u2EtrT1ASz1XVNF+LbYEk6ytLVA5
Checks for missing Authenticode signature.
resource |
---|
61decd5fed8472e535562f8094a334fb_JaffaCakes118 |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
InternetOpenA
InternetOpenUrlA
CloseHandle
HeapAlloc
GetProcessHeap
GetCurrentProcess
HeapFree
WaitForSingleObject
OpenProcess
GlobalAlloc
LoadLibraryA
ReadProcessMemory
HeapDestroy
HeapCreate
ReadFile
GlobalFree
OpenThread
MoveFileA
GetExitCodeThread
CompareStringA
GetCurrentThreadId
WriteProcessMemory
SuspendThread
ReleaseSemaphore
CreateSemaphoreA
TerminateThread
GetActiveWindow
DrawTextA
MoveWindow
ModifyMenuA
UpdateWindow
PostMessageA
ShowWindow
InvalidateRect
SetWindowLongA
GetMenu
GetForegroundWindow
SendMessageA
DrawIcon
GetWindowInfo
LoadIconA
GetWindowRect
ReleaseDC
FindWindowA
GetDC
BitBlt
LineTo
SelectObject
DeleteDC
CreateCompatibleDC
memset
?SetMegaFunction@@YGPAXKKK@Z
?SetSuperFunction@@YGPAXKKKK@Z
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ