Ft
Hto
Tevkno
Static task
static1
Behavioral task
behavioral1
Sample
b1c3d87c538a6b476dacd4d1d3919fc6_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
b1c3d87c538a6b476dacd4d1d3919fc6_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
b1c3d87c538a6b476dacd4d1d3919fc6_JaffaCakes118
Size
116KB
MD5
b1c3d87c538a6b476dacd4d1d3919fc6
SHA1
626f000e72d5fc0df6758470235e2f274b7dce9e
SHA256
4574bb61f78e8d24534187bbce0f64432dca4991f8a3b848dc890d33cb68256a
SHA512
3d2d3907bdc07b17875e21f768956c809b9d3f73c1d56a9c16dbca75ee6a6c6f906920b3dc5854164900a450b3cc3cfb0f4eca389fc8c243ecd6a69f547add1e
SSDEEP
3072:IjrOxeiixXp+ULTy+1hUt/nnGK7h/X+zH4W+W:P5ULTh1hUtRc+
Checks for missing Authenticode signature.
resource |
---|
b1c3d87c538a6b476dacd4d1d3919fc6_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
CloseHandle
CompareStringA
ExitProcess
GetACP
GetCommandLineA
GetModuleHandleA
GetOEMCP
GetPrivateProfileStringA
GetStartupInfoA
GetSystemTime
HeapAlloc
RtlUnwind
SetEndOfFile
SetLastError
SetUnhandledExceptionFilter
TlsFree
UnmapViewOfFile
VirtualFree
lstrcatA
lstrcpyA
ToAscii
ShowOwnedPopups
OemToCharBuffA
LoadAcceleratorsW
GetFocus
EndDeferWindowPos
EnableWindow
DestroyIcon
CharPrevA
GetWindowTextA
LsaEnumerateTrustedDomains
LsaGetQuotasForAccount
LsaGetRemoteUserName
LsaLookupNames
LsaLookupPrivilegeDisplayName
__vbaCyStr
__vbaCyInt
__vbaCyAbs
__vbaExitEachVar
__vbaAryConstruct2
__vbaExitEachColl
__vbaExitEachAry
__vbaEraseKeepData
__vbaDateVar
__vbaCyVar
DirectInputCreateA
DirectInputCreateEx
DirectInputCreateW
Ft
Hto
Tevkno
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ