?HideWindowA@@YGKPAFJFM*Z
?OnTimerA@@YGPAKPADPAGPAK*Z
?HideWidthOriginal@@YGKIF*Z
?OnFullNameExA@@YGMPAHK*Z
?SetPathW@@YGPAFF*Z
?SetObjectOld@@YGKPAJKHM*Z
?FormatRectEx@@YGPAHDF*Z
Static task
static1
Behavioral task
behavioral1
Sample
6aa0489b493b52ac91805a16445b12fc_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
6aa0489b493b52ac91805a16445b12fc_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Target
6aa0489b493b52ac91805a16445b12fc_JaffaCakes118
Size
109KB
MD5
6aa0489b493b52ac91805a16445b12fc
SHA1
4df22d709b09309d707a658e9484eaf5085d8f4e
SHA256
c30e8e626752c57fea76389d85199139ccba191bf931582a57de4db34da05d45
SHA512
093f7fde45c6a492fb769b2b093da8a5e62cd908d0dabfe722f634f5f02a683b05a01efdf187592ee05127a6b7337afe2d706fd8fd181e5f645f73e9d970f7ac
SSDEEP
1536:tDWMPGQ31Dxlhd2T9GoGNbrM4HJPAcGjziWRTz9S0flp4g5RJ+Ilqd:YMPGUbl/2xGoGprpRUznRTz9SP
Checks for missing Authenticode signature.
resource |
---|
6aa0489b493b52ac91805a16445b12fc_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
CreateCompatibleBitmap
StartPage
DeleteDC
PatBlt
CreateFontIndirectA
SetBitmapDimensionEx
RealizePalette
SetViewportOrgEx
CreatePenIndirect
SetPaletteEntries
GetTextExtentPoint32W
SetWindowExtEx
GetSystemPaletteEntries
Polygon
GetFontData
CreateCompatibleDC
SelectObject
MoveToEx
FindTextW
ChooseColorW
GetSaveFileNameW
SendNotifyMessageW
CreateIconIndirect
SetWindowPlacement
TileWindows
LockWindowUpdate
DestroyCaret
TranslateAcceleratorW
AdjustWindowRectEx
InflateRect
GetDC
AdjustWindowRect
GetSystemMetrics
GetFocus
DrawFrameControl
FindWindowW
keybd_event
CharNextW
TrackPopupMenuEx
ReleaseDC
GetPropW
InvertRect
CreateCaret
DefWindowProcA
GetClassInfoExW
IsWindowUnicode
SetScrollPos
CopyRect
SendDlgItemMessageW
BringWindowToTop
DestroyIcon
GetForegroundWindow
GetSysColor
AllowSetForegroundWindow
LoadBitmapW
DestroyWindow
GetScrollRange
GetNextDlgGroupItem
EnumWindows
DialogBoxIndirectParamA
GetKeyboardLayoutNameW
TranslateAcceleratorA
GetMenuState
CheckMenuItem
CreateWindowExA
DeleteFileA
FreeResource
LocalLock
FlushViewOfFile
GetSystemDirectoryA
FindFirstFileA
GetProcessHeap
GetModuleHandleA
PulseEvent
EnumResourceNamesW
OpenSemaphoreW
LocalFree
VerifyVersionInfoW
GetTimeFormatA
HeapFree
HeapAlloc
Sleep
LoadLibraryW
HeapReAlloc
FileTimeToSystemTime
VirtualQuery
QueryPerformanceCounter
EscapeCommFunction
OpenFileMappingW
_controlfp
__set_app_type
__p__fmode
mbtowc
__p__commode
_amsg_exit
_initterm
strncmp
wcstol
_acmdln
iswspace
exit
_ismbblead
wcscmp
_XcptFilter
realloc
strcspn
getc
_exit
_cexit
strncpy
isprint
printf
__setusermatherr
__getmainargs
strtoul
StrToIntA
PathRemoveBlanksW
StrNCatW
?HideWindowA@@YGKPAFJFM*Z
?OnTimerA@@YGPAKPADPAGPAK*Z
?HideWidthOriginal@@YGKIF*Z
?OnFullNameExA@@YGMPAHK*Z
?SetPathW@@YGPAFF*Z
?SetObjectOld@@YGKPAJKHM*Z
?FormatRectEx@@YGPAHDF*Z
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ