0H
b
_1@8
bey@24
_A@24
CT
_FS@24
gXR@16
Ho
n@12
_KVc
QOC
dz
swJ@24
u1
xMB
Static task
static1
Behavioral task
behavioral1
Sample
768f13e67fbc0fd875cac1586fc9e9a5_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
768f13e67fbc0fd875cac1586fc9e9a5_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Target
768f13e67fbc0fd875cac1586fc9e9a5_JaffaCakes118
Size
178KB
MD5
768f13e67fbc0fd875cac1586fc9e9a5
SHA1
87042c66f8bc0cb69659331dca9a7b88bb1871aa
SHA256
4205b7a614dc7619c3c2a162ed2653da3d52097154287cca578b0ae9bebb033b
SHA512
b30dfb0579e24004624d6475a91fbd6242dc4f55187a2984a745bf467eff2cafaffa540edb64de9850feddbf360842c13a1f5e351d3c4e8321dabde3e2a91945
SSDEEP
3072:zBTxcQCSLC2hEVgLCUgbitiq5ROnvB8oP0v9o24mAU:zAQNZLCvbiOvBPcamA
Checks for missing Authenticode signature.
resource |
---|
768f13e67fbc0fd875cac1586fc9e9a5_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
EndPaint
GetWindow
LoadCursorA
GetDesktopWindow
EnableMenuItem
IsIconic
EnumThreadWindows
CharUpperA
LoadIconA
LoadBitmapA
IsChild
EnumChildWindows
SHQueryValueExA
PathGetCharTypeA
PathIsDirectoryA
PathFileExistsA
SHDeleteValueA
FreeResource
lstrcpynA
ExitProcess
FormatMessageA
lstrcmpA
GetStringTypeA
CreateFileA
VirtualAlloc
GlobalAddAtomA
GetModuleHandleW
GetCPInfo
SetThreadLocale
SetHandleCount
GetCurrentThread
LockResource
lstrlenW
FindClose
GetEnvironmentStrings
GetThreadLocale
GetSystemDefaultLangID
GetACP
CloseHandle
FreeLibrary
LoadLibraryExA
CreateThread
GetModuleFileNameA
EnumCalendarInfoA
GetStdHandle
LoadLibraryA
RaiseException
GetDateFormatA
CreateEventA
GetFileSize
GetDiskFreeSpaceA
GetFullPathNameA
GetTickCount
SizeofResource
CompareStringA
GetStartupInfoA
MoveFileA
GetCurrentProcess
GetFileType
GetLastError
FindFirstFileA
LocalAlloc
GetVersion
lstrlenA
IsBadReadPtr
GetProcAddress
SetEndOfFile
VirtualFree
SetLastError
0H
b
_1@8
bey@24
_A@24
CT
_FS@24
gXR@16
Ho
n@12
_KVc
QOC
dz
swJ@24
u1
xMB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ