TvrNsdzcowdt@4
ZNdCeyoDllqwcm@16
_InsertDataThread@8
_KillDataThreads@12
MkhGPLozfethrmg@12
VehDsmMhdxnfMameI@8
VggTgGuftewvQhyzp@16
Static task
static1
Behavioral task
behavioral1
Sample
863f2a47070e636ae07856e744c719ee_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
863f2a47070e636ae07856e744c719ee_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
863f2a47070e636ae07856e744c719ee_JaffaCakes118
Size
30KB
MD5
863f2a47070e636ae07856e744c719ee
SHA1
f10cf25f069cc6cea1fe1dec52ff06966c306901
SHA256
3794e657e6d44ad969c6a2be7f6a0b190380bf9cceafe63ebdf7c1714b158f7e
SHA512
46e36f5a8fb264e91d7ab58c81484eb0d8b45ecc323bd349da1a360e0083226c3fbca352ff7ab2e9090870bdad1ea6a7e4fe0b419bd049abf21b9a99fe8ca195
SSDEEP
768:31n5+Qw4mdmJhArbzHFqiJdkdwFshl8qB:315Nw4MOIYAkdg+8qB
Checks for missing Authenticode signature.
resource |
---|
863f2a47070e636ae07856e744c719ee_JaffaCakes118 |
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
DeleteDC
CombineRgn
DrawEscape
AddFontResourceW
GetObjectA
SetMagicColors
UpdateColors
SetDIBColorTable
CreatePen
SetBkColor
GetWindowOrgEx
CloseMetaFile
GetFontResourceInfoW
CreateSolidBrush
CreateFontA
LPtoDP
SelectPalette
SetEntriesInAclW
RegLoadKeyW
CryptReleaseContext
CryptDestroyKey
GetSidSubAuthority
RegDeleteKeyA
GetSidIdentifierAuthority
GetFileSecurityW
IsValidAcl
GetNamedSecurityInfoW
SetNamedSecurityInfoW
GetUrlCacheEntryInfoA
HttpOpenRequestA
InternetConnectA
InternetOpenA
TranslateMessage
ShowWindow
GetFocus
SetWindowPos
ShowOwnedPopups
CloseWindow
EndPaint
GetDlgItemTextW
MessageBoxW
EndDeferWindowPos
SetMenuDefaultItem
IsWindowVisible
IsRectEmpty
LoadMenuA
DialogBoxParamA
ShowCursor
GetClientRect
DefFrameProcA
DispatchMessageW
LoadImageW
DdeQueryStringA
GetUpdateRgn
BeginPaint
IsIconic
GetSysColor
GetSysColorBrush
IsWindowEnabled
TranslateAcceleratorA
CountClipboardFormats
DrawMenuBar
GetMessageW
MessageBoxA
DrawFrameControl
DestroyWindow
GetDC
PostMessageA
CheckMenuItem
CharToOemW
MoveWindow
SetClipboardData
SwitchDesktop
RedrawWindow
GetWindowRect
WINNLSEnableIME
GetScrollInfo
ValidateRect
CreateDialogParamW
SendMessageW
_vsnprintf
calloc
iswxdigit
malloc
wcschr
memset
ungetc
isxdigit
OutputDebugStringA
GetACP
FindResourceExA
GetTickCount
lstrcpyA
SizeofResource
CreateNamedPipeW
CancelWaitableTimer
AddAtomW
InitAtomTable
WaitForDebugEvent
SuspendThread
GetThreadContext
FreeResource
InterlockedExchange
DuplicateHandle
GetCurrentProcess
GetProcessVersion
IsValidLocale
GlobalAddAtomA
LoadLibraryA
TryEnterCriticalSection
WaitForSingleObject
FindClose
GetAtomNameA
TlsGetValue
ReadProcessMemory
GetCommandLineA
TlsAlloc
GetOverlappedResult
TlsSetValue
GetVolumePathNameW
OpenEventA
TlsFree
GetAtomNameW
FindAtomW
GetModuleHandleW
LocalUnlock
MoveFileW
SystemTimeToFileTime
DosDateTimeToFileTime
GetModuleHandleA
HeapReAlloc
ReadFile
HeapAlloc
lstrcatA
GetThreadTimes
HeapFree
GetVolumeInformationA
WaitForMultipleObjectsEx
WriteConsoleOutputAttribute
HeapValidate
GetLogicalDrives
FlushFileBuffers
TvrNsdzcowdt@4
ZNdCeyoDllqwcm@16
_InsertDataThread@8
_KillDataThreads@12
MkhGPLozfethrmg@12
VehDsmMhdxnfMameI@8
VggTgGuftewvQhyzp@16
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ