?MainOneFunc@@YGPAXKK@Z
?MainTwoFunc@@YGPAXKK@Z
Static task
static1
Behavioral task
behavioral1
Sample
65fb67dcb7fdc72d2e203d5fb873b541_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
65fb67dcb7fdc72d2e203d5fb873b541_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Target
65fb67dcb7fdc72d2e203d5fb873b541_JaffaCakes118
Size
96KB
MD5
65fb67dcb7fdc72d2e203d5fb873b541
SHA1
3adc3bc5be0617ec9f3738998a07f9b594bef476
SHA256
f8d0c1d684881407e8300683673bc8751535a8629ba3a0ac2bd94460cc8be7e4
SHA512
6eeb72e8150f48ee9fc63eadecec294b84a2755b5a9892fbe4455872b03075d4cc6c7a0ada63ada37b0d1eb7d59021785041292efb41f4240095d2413f79efd0
SSDEEP
1536:dcB7ejQKPNehjOpjpzelGI/2EAQEoOjGeuXpxp6f0u979jwqeGdgGf6kOsyetKLe:dc/njOpjpzi12lQRxeuK0U9HeXGf6kOh
Checks for missing Authenticode signature.
resource |
---|
65fb67dcb7fdc72d2e203d5fb873b541_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
malloc
memset
_except_handler3
GetModuleBaseNameA
GetProcessHeap
OpenProcess
GlobalAlloc
TerminateThread
ReadProcessMemory
CreateProcessA
TerminateProcess
VirtualAlloc
GlobalFree
OpenThread
MoveFileA
GetExitCodeThread
GetModuleFileNameA
GetModuleHandleA
CompareStringA
GetCurrentThreadId
CloseHandle
WriteProcessMemory
SuspendThread
ResumeThread
VirtualFree
GetCurrentProcess
CreateSemaphoreA
WaitForSingleObject
ReleaseSemaphore
CreateFileA
GetFileSize
HeapAlloc
VirtualQuery
HeapFree
PostMessageA
ShowWindow
CreateWindowExA
InvalidateRect
GetScrollInfo
SetWindowLongA
GetMenu
GetForegroundWindow
SendMessageA
DrawIcon
GetWindowRect
DestroyWindow
SetWindowTextA
UpdateWindow
SetScrollInfo
ModifyMenuA
GetActiveWindow
DrawTextA
GetWindowInfo
ReleaseDC
SetWindowPos
MoveWindow
FindWindowA
GetDC
BeginPath
EndPath
TextOutA
MoveToEx
BitBlt
LineTo
DeleteDC
SelectObject
CreateCompatibleDC
Polyline
CreatePen
GetPath
PolyDraw
?MainOneFunc@@YGPAXKK@Z
?MainTwoFunc@@YGPAXKK@Z
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ