_jhY6e2
WoyxpMfWUsqjL
_Amy5Cmu7CZfR1K@4
_NwuBK9wgmte@8
9wrFWUKDg
_qO_Y4dfzz6Ccj2
_WIj8jLm_wlxovJ@20
_2IemZGq8wuQ@20
_CzAvM8IdKUHkxA@12
A_kLE1tCY4yN6
_htVnEXZpyZwsp
Jdq7pX3bUJ
hzy1jEP@24
6AuFipDYIKA@12
_Bwn2BjGDGR
_KE3GQXlLGa
GiWy0hxbO
_N4qDKOg
Static task
static1
Behavioral task
behavioral1
Sample
a1b846821071b2ab688dced59a788df5_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a1b846821071b2ab688dced59a788df5_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
a1b846821071b2ab688dced59a788df5_JaffaCakes118
Size
169KB
MD5
a1b846821071b2ab688dced59a788df5
SHA1
de830f4335a4d058ff470f3a6ee3996f3569f916
SHA256
c926c48ce4a4116eb1fcc885a49e912b90d07a81a44e9b097a8fe17d575e4ca0
SHA512
3e0eb57df517cb3c9a3b0ec1d7161c84703f3e1ef33c08c9cf5602132bbc07dffc5e9311bbed9c1bd39fdbfb8ed0e0d2b853069b228ed110f7911b551ec61580
SSDEEP
3072:KpoEzBPEb+k3OycKHCx8qAIi7p61jY2aV1DFGAJ7W8VeUh:HEzBsb+sBCvAIC81Hy8Ag
Checks for missing Authenticode signature.
resource |
---|
a1b846821071b2ab688dced59a788df5_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
VirtualAllocEx
LoadLibraryA
GetProcessHeap
LoadLibraryExA
RaiseException
VirtualAlloc
ExitProcess
GetBkColor
SaveDC
CreatePenIndirect
GetBkMode
TranslateMessage
UnhookWindowsHookEx
IsMenu
UnregisterClassA
GetMenu
CharLowerA
WaitMessage
FindTextA
GetSaveFileNameA
ChooseColorA
_jhY6e2
WoyxpMfWUsqjL
_Amy5Cmu7CZfR1K@4
_NwuBK9wgmte@8
9wrFWUKDg
_qO_Y4dfzz6Ccj2
_WIj8jLm_wlxovJ@20
_2IemZGq8wuQ@20
_CzAvM8IdKUHkxA@12
A_kLE1tCY4yN6
_htVnEXZpyZwsp
Jdq7pX3bUJ
hzy1jEP@24
6AuFipDYIKA@12
_Bwn2BjGDGR
_KE3GQXlLGa
GiWy0hxbO
_N4qDKOg
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ