CloseFeed
GetPort
IsReadyToRead
OpenFeed
ReadData
RunScript
SendData
WSAStart
Static task
static1
Behavioral task
behavioral1
Sample
890da89d221370dd77fb7419de2b2fb3_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
890da89d221370dd77fb7419de2b2fb3_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
890da89d221370dd77fb7419de2b2fb3_JaffaCakes118
Size
333KB
MD5
890da89d221370dd77fb7419de2b2fb3
SHA1
47311c8c6e5736fb6e144f9cda9a42e5632c0d4b
SHA256
6ace6d054787e8afed4fa57781afbab0e6a0abceca9eec57d19b40694379dba2
SHA512
6c799e179318f54bfb15f157750beb9018733a68567fbae735eb9880be86a686fa1379712feca375e684580b26977583eea0812ffe652a11076f4557f6e36f74
SSDEEP
6144:/KcfVdMaDUbWprfw+Pm2/TXuyltsFoKKuI+nPC/NQ:lGiroN2rRtKKuIoPg
Checks for missing Authenticode signature.
resource |
---|
890da89d221370dd77fb7419de2b2fb3_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
SHGetSettings
UuidCreate
CoTaskMemFree
CoTaskMemAlloc
ImagehlpApiVersion
FindExecutableImage
ImageRvaToVa
ImageRvaToSection
GetTimestampForLoadedLibrary
FindExecutableImageEx
GetFileVersionInfoSizeW
VerQueryValueW
GetFileVersionInfoW
GetDC
GetKeyboardLayout
GetKeyboardLayoutList
GetMenuCheckMarkDimensions
GetMonitorInfoA
GetSysColor
GetSystemMetrics
ReleaseDC
SystemParametersInfoA
EnumDisplayMonitors
FormatMessageW
FreeLibrary
GetCurrentProcess
GetCurrentProcessId
GetCurrentThread
GetCurrentThreadId
GetDiskFreeSpaceExW
GetFileAttributesW
GetFileType
GetLastError
GetLocalTime
GetModuleFileNameA
GetModuleFileNameW
GetModuleHandleA
GetModuleHandleW
GetProcAddress
GetProcessHeap
GetProcessTimes
GetShortPathNameA
GetStringTypeExW
GetSystemDefaultLCID
GetSystemDirectoryW
GetSystemInfo
GetSystemTimeAsFileTime
GetSystemWindowsDirectoryW
DeleteCriticalSection
GetTickCount
GetTimeZoneInformation
GetUserDefaultLCID
GetVersion
GetVersionExA
GlobalAlloc
GlobalFree
GlobalMemoryStatus
HeapAlloc
HeapCreate
HeapDestroy
HeapFree
HeapLock
HeapReAlloc
HeapSize
HeapUnlock
FindNextFileW
InterlockedCompareExchange
InterlockedExchange
IsDBCSLeadByte
IsDebuggerPresent
IsProcessorFeaturePresent
IsValidCodePage
IsValidLocale
LeaveCriticalSection
LoadLibraryA
LoadLibraryExW
LoadLibraryW
LocalAlloc
LocalFree
MultiByteToWideChar
OutputDebugStringA
QueryPerformanceCounter
RaiseException
ReleaseMutex
ReleaseSemaphore
RemoveDirectoryW
SetFileAttributesW
SetLastError
SetLocalTime
SetUnhandledExceptionFilter
Sleep
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
VirtualAlloc
VirtualFree
VirtualProtect
WaitForSingleObject
WideCharToMultiByte
WriteFile
CreateSemaphoreA
CreateMutexA
CreateFileW
CreateDirectoryW
CloseHandle
FindFirstFileW
FindClose
ExpandEnvironmentStringsW
EnterCriticalSection
InitializeCriticalSection
DeleteFileW
GetTempPathW
GetTraceEnableLevel
AddAccessDeniedAce
GetTokenInformation
GetSecurityDescriptorDacl
GetLengthSid
FreeSid
CopySid
ConvertStringSecurityDescriptorToSecurityDescriptorW
UnregisterTraceGuids
TraceEvent
SetSecurityDescriptorDacl
RegisterTraceGuidsA
RegSetValueExW
RegSetValueExA
RegQueryValueExW
RegQueryValueExA
RegQueryInfoKeyW
RegOpenKeyExW
RegOpenKeyExA
RegEnumKeyW
RegCreateKeyExW
RegCloseKey
OpenThreadToken
OpenProcessToken
IsValidSid
InitializeSecurityDescriptor
InitializeAcl
GetTraceLoggerHandle
ConvertSidToStringSidA
CheckTokenMembership
AllocateAndInitializeSid
AddAccessAllowedAce
StrCmpNA
StrChrA
PathFileExistsA
ChrCmpIA
DeleteObject
DeleteDC
CreateSolidBrush
CreateDCA
GetDeviceCaps
ord9
CloseFeed
GetPort
IsReadyToRead
OpenFeed
ReadData
RunScript
SendData
WSAStart
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ