KkpRmwSUlzgLu@12
AskXqjvvakjnjeuum@8
_RemoveQueueMsg@8
_SendTestMsg@12
HcaQwzHqvemZqjy@8
BzvQgcwaAxkoez@16
Static task
static1
Behavioral task
behavioral1
Sample
b3552926614d831774339c5a83a33587_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b3552926614d831774339c5a83a33587_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
b3552926614d831774339c5a83a33587_JaffaCakes118
Size
1.5MB
MD5
b3552926614d831774339c5a83a33587
SHA1
f584a2191e46b2461636292911b0b4cfd6afbee7
SHA256
d26280afe70536ffbb47b33cc0f6ec15a79591ad5c7f4d4fe97d8cf72ac00e36
SHA512
a582416858ffbf60419c8abf2c93ac1f5606d291cec777885810e44d180ec1cd84c7c129903a79fc5771608adbbabbe34d7b74c1e1242b3f10c7bb72c0311fd7
SSDEEP
24576:RAhkeue/jLwPkLzVO8v2KeSu7wdybLWvcxvhF9GWp4HpWkuLwMfBzetfuYqjAkz3:RqXHwPkPVKKeSu7PLbxZFkzpdMfQtfRy
Checks for missing Authenticode signature.
resource |
---|
b3552926614d831774339c5a83a33587_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
InterlockedExchange
GetTickCount
OutputDebugStringA
SystemTimeToFileTime
lstrcpyA
OpenEventA
GetConsoleOutputCP
SetConsoleHardwareState
LoadLibraryA
lstrcatA
GlobalFindAtomW
DefineDosDeviceW
GetThreadContext
VirtualUnlock
GetCurrentDirectoryA
SizeofResource
HeapAlloc
TlsSetValue
GetOverlappedResult
SetNamedPipeHandleState
WaitForDebugEvent
GetUserDefaultLCID
GetACP
GlobalGetAtomNameW
HeapWalk
SetInformationJobObject
AddAtomA
GetSystemTime
GlobalHandle
GetCommandLineW
DuplicateHandle
MoveFileW
CreateEventW
GlobalAddAtomW
GetCommandLineA
GetModuleHandleA
WaitForSingleObject
GetProcessVersion
GetThreadTimes
TlsGetValue
WriteConsoleInputA
InitAtomTable
HeapValidate
TlsAlloc
DisconnectNamedPipe
GetTimeFormatW
WriteConsoleInputW
InvalidateConsoleDIBits
lstrcpyW
DosDateTimeToFileTime
VerifyConsoleIoHandle
CreateMailslotW
SetUnhandledExceptionFilter
FreeResource
FileTimeToSystemTime
HeapFree
GetStringTypeA
ReadConsoleOutputA
TlsFree
RtlUnwind
RtlQueryInformationAcl
NtQueryVolumeInformationFile
towupper
RtlAllocateHeap
wcscpy
NtVdmControl
RtlCopyLuid
NtQueryInformationToken
NtAcceptConnectPort
RtlUpcaseUnicodeChar
NtOpenMutant
RtlUpperChar
wcscat
RtlReAllocateHeap
RtlGetDaclSecurityDescriptor
RtlUnicodeToMultiByteSize
ImageDirectoryEntryToData
CreateAcceleratorTableW
DefMDIChildProcW
SystemParametersInfoA
LoadImageW
GetSysColor
EndPaint
IsWindowEnabled
DrawMenuBar
DrawTextA
ShowScrollBar
CloseWindow
BeginPaint
RedrawWindow
SetClipboardData
IsChild
LoadAcceleratorsA
CharToOemW
DispatchMessageW
ValidateRect
MessageBoxA
MoveWindow
InflateRect
ShowWindow
GetDC
GetWindowRect
IsIconic
UnregisterClassA
TranslateMessage
DestroyWindow
GetDlgItemTextA
SetWindowPos
IsHungAppWindow
GetUpdateRect
IsWindowVisible
GetClientRect
SetProcessDefaultLayout
ReleaseDC
SetWindowLongA
ShowCaret
TranslateAcceleratorA
DdeClientTransaction
LockWindowStation
PostMessageA
GetFocus
GetMessageW
LoadCursorA
wvsprintfW
_vsnprintf
memset
wcsncat
swscanf
strchr
strcpy
isspace
fgets
SelectPalette
SetBkColor
SaveDC
CreatePen
TextOutA
UpdateColors
CreateBitmap
CreateCompatibleDC
CloseEnhMetaFile
BeginPath
CreateSolidBrush
DrawEscape
GetObjectA
GetTextExtentPointW
SetRectRgn
CreatePolygonRgn
GetTextMetricsA
DeleteDC
KkpRmwSUlzgLu@12
AskXqjvvakjnjeuum@8
_RemoveQueueMsg@8
_SendTestMsg@12
HcaQwzHqvemZqjy@8
BzvQgcwaAxkoez@16
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ