OpenCfhbwukxsav
Wtjeofoge
InitKnbbmian
Unncnmtf
InitYyxoafhisu
Bawyudaigd
Vgmvxbhhgib
Jtlvdhbxpe
InitUhlfjmn
AddFodvckvwd
Rxyxsmyp
SetNubthrr
WriteWudkcorr
Tnohhaiil
Gtgswdbh
SetVlihotqtby
Fbhstffun
Jekicndxrp
Static task
static1
Behavioral task
behavioral1
Sample
a6a5e0e771276d2877b3ac80d21365e5_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
a6a5e0e771276d2877b3ac80d21365e5_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
a6a5e0e771276d2877b3ac80d21365e5_JaffaCakes118
Size
19KB
MD5
a6a5e0e771276d2877b3ac80d21365e5
SHA1
524de90564c39561ddb285790ca939a354c9c7ed
SHA256
9be9d97f5c9d9f99453c192aeeb8de731df595c7512f3830afc774ef82390b67
SHA512
ba70d23dea89ac61c7f9e844c6205e00ac547773c0fb3f2068da74894a961a8b38d568a11f7e42fbd0af49a6e2dda1a023f44b624b8b4485e0a3790532fb82cb
SSDEEP
384:c18utR+SfosDxGrEbI6ThFBe618di/hzwe3y183N5wL5:cSuBtD4ryrThYU5ySd5wL5
Checks for missing Authenticode signature.
resource |
---|
a6a5e0e771276d2877b3ac80d21365e5_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetDateFormatA
ReadConsoleInputA
GlobalSize
LZInit
GetDiskFreeSpaceExA
GetConsoleCursorInfo
CreateEventA
OpenThread
GetDriveTypeA
GetProcessIoCounters
FindNextVolumeMountPointA
FindNextVolumeW
LoadLibraryA
DeleteTimerQueueTimer
SetConsoleIcon
ReadFileScatter
GetFileTime
WriteConsoleOutputCharacterW
OpenFileMappingA
GetProfileIntA
WaitForSingleObject
GetConsoleFontSize
SetUnhandledExceptionFilter
WriteConsoleOutputA
SetVolumeLabelA
UnlockFile
EnumTimeFormatsA
MapUserPhysicalPages
GetProcessId
GetThreadContext
VirtualAlloc
WriteConsoleOutputCharacterA
GetBinaryTypeA
OpenEventA
OpenSemaphoreA
GetUserDefaultLangID
PurgeComm
SearchPathA
PeekConsoleInputA
GetThreadContext
GetCurrentThread
TerminateProcess
GetThreadPriorityBoost
GetStdHandle
GetCurrentProcess
GetDllDirectoryA
FlushInstructionCache
WriteProfileSectionA
GetLocaleInfoA
HeapQueryInformation
SetVolumeMountPointA
ReadConsoleA
GetStringTypeExW
GetProcessHeap
GetConsoleCommandHistoryA
GetPrivateProfileIntA
GetLogicalDriveStringsA
GetModuleHandleA
lstrlenA
Module32Next
GetAtomNameA
GetSystemWindowsDirectoryA
SetFilePointerEx
ReadConsoleOutputCharacterA
VirtualQuery
SetConsoleInputExeNameA
lstrcmp
VirtualAlloc
AllocConsole
CopyFileExW
CommConfigDialogA
UpdateResourceA
FindNextVolumeA
SetPriorityClass
ReleaseMutex
RemoveDirectoryA
GetFullPathNameA
CreateDirectoryExA
WideCharToMultiByte
IsProcessorFeaturePresent
CreateDirectoryA
SetProcessPriorityBoost
TransmitCommChar
HeapValidate
FindFirstChangeNotificationA
GetFileInformationByHandle
LockFile
SetConsoleHardwareState
SetFileAttributesA
ChangeTimerQueueTimer
WriteConsoleOutputAttribute
GetModuleFileNameA
QueryPerformanceFrequency
SetThreadAffinityMask
GetConsoleKeyboardLayoutNameA
SetConsoleWindowInfo
FindNextVolumeMountPointW
SetVolumeLabelW
GetConsoleWindow
SetConsoleOutputCP
GetWindowsDirectoryA
ReleaseSemaphore
SetComputerNameA
FindCloseChangeNotification
SetLocalPrimaryComputerNameA
GetNamedPipeInfo
DhcpUndoRequestParams
SQLExecute
SQLSetStmtAttr
Direct3DCreate9
OpenCfhbwukxsav
Wtjeofoge
InitKnbbmian
Unncnmtf
InitYyxoafhisu
Bawyudaigd
Vgmvxbhhgib
Jtlvdhbxpe
InitUhlfjmn
AddFodvckvwd
Rxyxsmyp
SetNubthrr
WriteWudkcorr
Tnohhaiil
Gtgswdbh
SetVlihotqtby
Fbhstffun
Jekicndxrp
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ