OpenVrdfckchvrl
CloseNdcbdxfk
InitPlyejocg
Wpvwtghc
Jtxommgko
SetMvtgwdnv
Static task
static1
Behavioral task
behavioral1
Sample
60dfb5adfc7be9dd987da51a144a5d17_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
60dfb5adfc7be9dd987da51a144a5d17_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Target
60dfb5adfc7be9dd987da51a144a5d17_JaffaCakes118
Size
388KB
MD5
60dfb5adfc7be9dd987da51a144a5d17
SHA1
87d51833a1dacbc569039a733fe8a17df1cfdf41
SHA256
a81acbdd97289efb19ab3a90c29e49352753f02db07a3c395bf3176586760e50
SHA512
923e3fe779d0689936f36ea582e8463ba1dc21ad98e49d4adcdc8ccd18b6e1aace2277386acd26e6839aae197a53b0a71687d4ff4312b050cf165307ee96631a
SSDEEP
3072:WqBl2VSB3hSE4b5kivlyZXhYU4wAZLYA42pGx+7Tgc67OMGD35Kh:n1BRy9vehGwUL74w6aMcm
Checks for missing Authenticode signature.
resource |
---|
60dfb5adfc7be9dd987da51a144a5d17_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetPriorityClass
GlobalAlloc
SetConsoleCursorInfo
ReadFileScatter
SetPriorityClass
WriteProfileStringA
GetProfileStringA
SetThreadExecutionState
GetBinaryTypeA
WriteProcessMemory
GetConsoleAliasesLengthA
ProcessIdToSessionId
HeapLock
GetProcessIoCounters
lstrlenA
MulDiv
LZOpenFileA
IsBadCodePtr
SetFileTime
WaitForMultipleObjects
GetFileSize
GetMailslotInfo
SetEndOfFile
MoveFileWithProgressA
GetCurrentDirectoryA
GetEnvironmentStringsA
DeleteFileA
GetVolumeNameForVolumeMountPointA
GetVersionExA
GetNamedPipeHandleStateA
SearchPathA
CreateWaitableTimerA
GetProcessHeaps
_lread
FindAtomA
SetConsoleLocalEUDC
GetSystemTime
ReadConsoleOutputCharacterA
IsBadStringPtrA
GetVolumePathNameA
GetTapeParameters
GetWindowsDirectoryA
ReplaceFile
LocalFlags
ShowConsoleCursor
GetCommModemStatus
GetDiskFreeSpaceExA
OpenEventA
HeapSize
SetCommTimeouts
PeekConsoleInputA
SetConsoleCursor
GetThreadContext
SetFileValidData
GetLocaleInfoA
GetOEMCP
SetConsoleLocalEUDC
GetTempFileNameA
GetPrivateProfileStringA
CreateTimerQueueTimer
WaitForSingleObjectEx
BuildCommDCBAndTimeoutsA
GetComputerNameA
GetEnvironmentVariableA
SizeofResource
ReadConsoleA
GetProcessId
GetDefaultCommConfigA
GetVersionExA
OpenFileMappingA
GetCommState
ConnectNamedPipe
GetTickCount
VirtualAlloc
HeapFree
SetConsoleTitleA
CreateDirectoryExA
LZStart
GetConsoleCursorMode
VirtualQuery
CreateMutexA
GetModuleFileNameA
IsDebuggerPresent
lstrcmpA
GlobalGetAtomNameA
VerifyVersionInfoA
DeleteTimerQueueEx
GetDllDirectoryA
SetLocaleInfoA
ReadConsoleOutputCharacterA
IsSystemResumeAutomatic
GetLogicalDriveStringsA
ReadConsoleOutputA
FindFirstFileExA
GetExitCodeThread
UnlockFileEx
TransmitCommChar
PeekConsoleInputA
SetLocalPrimaryComputerNameA
GetFileTime
ReadConsoleOutputCharacterA
BeginUpdateResourceA
GetNamedPipeHandleStateA
EnumSystemGeoID
OpenWaitableTimerA
GetProcAddress
SetThreadUILanguage
GetSystemTimeAdjustment
OpenJobObjectA
RegisterWaitForSingleObject
GetDiskFreeSpaceExA
_lclose
ReleaseMutex
FindResourceA
GetLogicalDriveStringsA
HeapQueryInformation
GlobalAddAtomA
HeapUnlock
GetCalendarInfoA
GetCalendarInfoA
HeapAlloc
GetConsoleTitleA
lstrcatA
GetLocaleInfoA
OpenProfileUserMapping
WriteConsoleOutputAttribute
Heap32First
MoveFileExW
lstrcmpi
LoadLibraryExA
GetUserGeoID
GetLogicalDriveStringsA
SetConsoleMaximumWindowSize
GetCommState
CreateDirectoryExA
GlobalMemoryStatus
WinExec
GetTimeZoneInformation
OpenFileMappingA
FindVolumeMountPointClose
LockFile
GetLocaleInfoA
GetConsoleWindow
ReadConsoleOutputAttribute
GetConsoleHardwareState
GetTickCount
lstrcatA
GetCurrentProcessId
GetCompressedFileSizeA
GetConsoleScreenBufferInfo
GetProcessId
FlushViewOfFile
LZClose
GetDiskFreeSpaceA
IsBadReadPtr
GetDriveTypeA
ChangeTimerQueueTimer
ReadConsoleOutputAttribute
CopyFileExA
OpenFileMappingA
GetCurrentConsoleFont
LZStart
SetFilePointer
FindFirstChangeNotificationA
FlushInstructionCache
GetFullPathNameA
IsValidCodePage
ReleaseMutex
FindNextChangeNotification
VirtualProtectEx
CreateDirectoryA
GlobalMemoryStatus
WriteConsoleOutputA
PurgeComm
GlobalAddAtomA
ScrollWindowEx
GetAltTabInfoA
EnumPropsExA
SetInternalWindowPos
GetWindowTextA
RegisterDeviceNotificationA
IsCharAlphaNumericW
SetCursorContents
EnumWindowStationsA
SetScrollPos
ReplyMessage
CallWindowProcA
LockSetForegroundWindow
GetUpdateRect
EnumPropsExA
SetDeskWallpaper
GetUserObjectSecurity
GetMenuItemRect
IsCharAlphaNumericA
SetScrollPos
IsZoomed
PrivateExtractIconsA
GetDlgItemInt
EndMenu
IsIconic
DefFrameProcA
SetCursorContents
GetShellWindow
DestroyReasons
LockSetForegroundWindow
DrawFrame
CountClipboardFormats
GetWindowLongA
OpenWindowStationA
OpenWindowStationA
SetMenuContextHelpId
CreateDialogParamA
EnumDisplaySettingsExA
ShowWindow
GetSysColor
GetCursorFrameInfo
GetInputState
UnregisterClassA
LockWindowUpdate
RegisterMessagePumpHook
DestroyReasons
DragDetect
EnumThreadWindows
EndMenu
GetKeyState
SetMenuItemBitmaps
RegisterClipboardFormatA
IsMenu
CreateAcceleratorTableA
GetDCEx
SetMenu
LoadStringA
GetComboBoxInfo
RegisterSystemThread
CreateDesktopA
UpdatePerUserSystemParameters
MapDialogRect
AnyPopup
CharLowerBuffA
LoadKeyboardLayoutA
DlgDirSelectExA
SendIMEMessageExA
RegisterClassExW
ChildWindowFromPoint
UnhookWindowsHook
OemToCharBuffA
CreateAcceleratorTableA
EnumDisplayDevicesA
GetMenuContextHelpId
SendInput
ChangeMenuA
GetMenuItemInfoA
DestroyMenu
ChildWindowFromPointEx
CreateDialogParamA
ScrollDC
SetSystemMenu
DestroyReasons
HiliteMenuItem
BroadcastSystemMessageA
SetMenu
closesocket
OpenVrdfckchvrl
CloseNdcbdxfk
InitPlyejocg
Wpvwtghc
Jtxommgko
SetMvtgwdnv
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ