?SetMegaFunction@@YGPAXKKK@Z
?SetSuperFunction@@YGPAXKKKK@Z
Static task
static1
Behavioral task
behavioral1
Sample
b827a223e6d128cf1100c02a3cbe89a4_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b827a223e6d128cf1100c02a3cbe89a4_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
b827a223e6d128cf1100c02a3cbe89a4_JaffaCakes118
Size
95KB
MD5
b827a223e6d128cf1100c02a3cbe89a4
SHA1
12a0f6880b9b4db19d4dbd0a15244b86214bcadb
SHA256
908441362758be54455174af925273211d5d13aba20237657e2d116cd52ce4a7
SHA512
e1bc845beab27a1a795e6a948fcf15840d33bb784c5d54307bec5abc6bca92c35bd81e3420d763b11e6afae60b4abbfa7996071e8f5defb447dbcc80cea9191a
SSDEEP
1536:5cZ3ekC4trTgtpEUiU02fpWzkS80l41Wav+8IYIW7LkiA5M6:kDHtrTgAf2xa9aA8IYtLVA5
Checks for missing Authenticode signature.
resource |
---|
b827a223e6d128cf1100c02a3cbe89a4_JaffaCakes118 |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
InternetOpenA
InternetOpenUrlA
CloseHandle
HeapAlloc
GetProcessHeap
GetCurrentProcess
HeapFree
WaitForSingleObject
OpenProcess
GlobalAlloc
LoadLibraryA
ReadProcessMemory
HeapDestroy
HeapCreate
ReadFile
GlobalFree
OpenThread
MoveFileA
GetExitCodeThread
CompareStringA
GetCurrentThreadId
WriteProcessMemory
SuspendThread
ReleaseSemaphore
CreateSemaphoreA
TerminateThread
GetActiveWindow
DrawTextA
MoveWindow
ModifyMenuA
UpdateWindow
PostMessageA
ShowWindow
InvalidateRect
SetWindowLongA
GetMenu
GetForegroundWindow
SendMessageA
DrawIcon
GetWindowInfo
LoadIconA
GetWindowRect
ReleaseDC
FindWindowA
GetDC
BitBlt
LineTo
SelectObject
DeleteDC
CreateCompatibleDC
memset
?SetMegaFunction@@YGPAXKKK@Z
?SetSuperFunction@@YGPAXKKKK@Z
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ