?adasdasdasd@@YGHPAEH@Z
?oiuqwoeuopqwe@@YGXPADID@Z
Static task
static1
Behavioral task
behavioral1
Sample
b6b9d892afb3fb13900849e395960b07_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
b6b9d892afb3fb13900849e395960b07_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
b6b9d892afb3fb13900849e395960b07_JaffaCakes118
Size
351KB
MD5
b6b9d892afb3fb13900849e395960b07
SHA1
d92cf54b3cacc016d2e7422fded79acf55bddf09
SHA256
d2c3b801dadf03454f1f5d47dcceb479221accf95c54f65a8b949c58bee9df50
SHA512
84fa0e8edef9e2bd99ce1f5ee35696d78c97d1b7ecd3de9f7ecd20bbf5aebcf3efd7cfa4f0117329851371eb0321baa61d00a117c1adf9f491bacb3387e67e26
SSDEEP
6144:7/LAcT89Q1Aap2zvy/lkk5i7JJ7txe1GyfqVDSRCTmefK3wg1BM6l2Tcek:7/jTH1AaojyqJ9txxJlSRyQv1B6zk
Checks for missing Authenticode signature.
resource |
---|
b6b9d892afb3fb13900849e395960b07_JaffaCakes118 |
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
_CxxThrowException
free
_purecall
__CxxFrameHandler
malloc
_adjust_fdiv
??1type_info@@UAE@XZ
?terminate@@YAXXZ
__dllonexit
wcsrchr
_wcsupr
_wtol
wcsncmp
wcstol
_ltow
_callnewh
_initterm
_except_handler3
_onexit
_wcsicmp
_ultow
wcsncpy
wcscmp
wcscpy
wcslen
??0exception@@QAE@ABV0@@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBDABV?$allocator@D@1@@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??1out_of_range@std@@UAE@XZ
??0out_of_range@std@@QAE@ABV01@@Z
??0logic_error@std@@QAE@ABV01@@Z
??0_Lockit@std@@QAE@XZ
??1_Lockit@std@@QAE@XZ
?nothrow@std@@3Unothrow_t@1@B
??0bad_alloc@std@@QAE@ABV01@@Z
??1bad_alloc@std@@UAE@XZ
??0bad_alloc@std@@QAE@PBD@Z
??0out_of_range@std@@QAE@ABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@1@@Z
ord15
ord30
ord58
ord32
ord20
ord16
ord21
ord23
ord17
IASVariantChangeType
TraceVprintfExW
TraceRegisterExW
TraceDeregisterA
VariantClear
SysFreeString
SysAllocString
LoadRegTypeLi
SysStringLen
SafeArrayCreate
VariantInit
SafeArrayDestroy
SafeArrayCreateVector
SafeArrayUnaccessData
SafeArrayAccessData
SysAllocStringByteLen
SysStringByteLen
SafeArrayGetUBound
SafeArrayGetLBound
SafeArrayGetDim
GetErrorInfo
VariantCopy
CoTaskMemRealloc
CoTaskMemAlloc
CoTaskMemFree
CoInitializeEx
CoCreateInstance
CLSIDFromProgID
CoRevertToSelf
CoImpersonateClient
CoUninitialize
CoInitializeSecurity
CloseServiceHandle
RegisterServiceCtrlHandlerA
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
DeleteService
OpenServiceA
OpenSCManagerA
RegDeleteKeyA
RegEnumKeyExA
RegSetValueExA
RegCreateKeyExA
SetServiceStatus
UuidCreate
RpcStringFreeA
UuidToStringA
wsprintfW
lstrlenA
EnterCriticalSection
LeaveCriticalSection
VirtualQuery
InterlockedExchange
Sleep
FormatMessageW
lstrcpynA
lstrcatA
lstrcpyA
lstrcmpiA
SetLastError
CreateEventW
WaitForSingleObject
CloseHandle
CreateDirectoryA
GetEnvironmentVariableA
InitializeCriticalSection
DeleteCriticalSection
InterlockedIncrement
InterlockedDecrement
DisableThreadLibraryCalls
SetEvent
GetModuleFileNameA
GetLastError
lstrcmpA
SwitchToThread
TryEnterCriticalSection
LocalFree
DeleteFileA
CopyFileA
GetWindowsDirectoryA
GetSystemWow64DirectoryA
RemoveDirectoryA
?adasdasdasd@@YGHPAEH@Z
?oiuqwoeuopqwe@@YGXPADID@Z
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ