KmmbTobyhhTytqsGf
BxsUoytkpPsl
TanudMqnek
Static task
static1
Behavioral task
behavioral1
Sample
af09a0298f28eace0fa33685a04b3749_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
af09a0298f28eace0fa33685a04b3749_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
af09a0298f28eace0fa33685a04b3749_JaffaCakes118
Size
120KB
MD5
af09a0298f28eace0fa33685a04b3749
SHA1
6c00406619847be7661e691ce62a70012708cf2f
SHA256
4601b8f0d77fe19a4e7bd57d795926bb3d42f61457fa9e8386ef4510b9b1e0cf
SHA512
8d8e07126b00a09bd83a61541ed66b67f09c547edbf8518ebd5dd482fb09da05e667649e93701704d6ab55201ec8b1da1369df8530e38f01faa6a549d1b34412
SSDEEP
3072:jD96w8rMnMaaUa2tjLjOZ4GEpeRdfbdx6k:ngbMniCBLUVL1b
Checks for missing Authenticode signature.
resource |
---|
af09a0298f28eace0fa33685a04b3749_JaffaCakes118 |
IMAGE_DLLCHARACTERISTICS_WDM_DRIVER
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetCurrentProcess
OutputDebugStringA
VirtualProtect
CallNamedPipeA
GetLastError
ExitThread
GetProcAddress
_lclose
GetWindowsDirectoryA
VirtualAlloc
FreeLibrary
lstrlenA
GetModuleHandleA
WriteConsoleW
CreateFileW
VirtualFree
FindFirstFileW
HeapAlloc
CallNamedPipeW
LoadLibraryW
GetStringTypeW
_c_exit
__p__commode
wcscpy
__dllonexit
_iob
isdigit
_except_handler3
free
_vsnprintf
memcpy
swscanf
malloc
wcscat
__winitenv
_ftol
wcscmp
_adjust_fdiv
wcschr
_cexit
__p__fmode
_controlfp
_wtol
wcslen
_wcmdln
strncpy
_purecall
_exit
__initenv
swprintf
_snwprintf
__CxxFrameHandler
ClientToScreen
MapWindowPoints
ReleaseCapture
IsWindow
CopyRect
DestroyWindow
ReleaseDC
DialogBoxParamA
wsprintfW
RegisterClassA
GetParent
LoadMenuW
DispatchMessageW
LoadCursorW
GetProcessWindowStation
LoadImageW
ScreenToClient
SendMessageW
SetScrollPos
GetCursorPos
BeginPaint
GetMenuItemCount
SetCapture
SendMessageA
LoadCursorA
UnregisterClassW
CheckDlgButton
ShellExecuteW
SHGetFileInfoW
SHGetPathFromIDListW
SHGetFolderPathW
glColor4i
glColor4d
glColor3ui
GlmfBeginGlsBlock
glStencilMask
glTexCoord2dv
glFogfv
glTexCoord2d
wglShareLists
glColor4f
KmmbTobyhhTytqsGf
BxsUoytkpPsl
TanudMqnek
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ