Mpb
Qqnzbykt
Static task
static1
Behavioral task
behavioral1
Sample
948393a8d517bab00c5968c4658981e2_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
948393a8d517bab00c5968c4658981e2_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
948393a8d517bab00c5968c4658981e2_JaffaCakes118
Size
126KB
MD5
948393a8d517bab00c5968c4658981e2
SHA1
06980b2becf2718b7101f155c17c39f6e0d259ee
SHA256
10249d4475e82d3fa77413fd1c0bda0703625cab54b9d350c2b842946feebb73
SHA512
dd7cab54caf55b20b3277186b81bb33b56cd82f61a14527a16166339df4356af417d1fc6b5820371cb62fe69114a60d04297a019df36e0d3ade08ea9919efc80
SSDEEP
3072:+ReuCi6G1wn3JeIu8zARWGj4eraSY6OLpb:5zGwZZjxGjtraS6
Checks for missing Authenticode signature.
resource |
---|
948393a8d517bab00c5968c4658981e2_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
CloseHandle
EnumResourceNamesA
ExitProcess
GetACP
GetCommandLineA
GetFileSize
GetModuleHandleA
GetOEMCP
GetStartupInfoA
GetTimeFormatA
LoadLibraryA
RtlUnwind
SetUnhandledExceptionFilter
TlsGetValue
VirtualAlloc
WriteFile
lstrcmpA
lstrcpyA
lstrcpynA
lstrlenA
ToAscii
ShowCursor
ShowCaret
SetFocus
RegisterClassA
LoadAcceleratorsW
GetMenu
EnableWindow
DestroyIcon
DestroyCursor
DeleteMenu
CreateDesktopW
CreateDesktopA
CharNextA
ShowScrollBar
RegQueryValueA
LsaClose
LsaCreateTrustedDomainEx
LsaDeleteTrustedDomain
LsaEnumeratePrivilegesOfAccount
LsaEnumerateTrustedDomains
LsaGetQuotasForAccount
LsaGetUserName
LsaICLookupNames
LsaLookupNames
LsaLookupPrivilegeDisplayName
RegOpenKeyExA
__vbaAryVarVarg
__vbaBoolStr
__vbaCastObjVar
__vbaFileSeek
__vbaFileCloseAll
__vbaExitEachAry
__vbaDateVar
__vbaCyVar
__vbaCyInt
__vbaCyI4
__vbaCopyBytes
__vbaCheckType
__vbaBoolErrVar
DirectInputCreateA
DirectInputCreateW
DirectInputCreateEx
Mpb
Qqnzbykt
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ