@Bevuzi@8
@Dotogo@12
@Tedona@8
@Yucutu@4
@Zocobo@12
Static task
static1
Behavioral task
behavioral1
Sample
bb4749d67cabfd41acf633cf0956665f_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
bb4749d67cabfd41acf633cf0956665f_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
bb4749d67cabfd41acf633cf0956665f_JaffaCakes118
Size
6.0MB
MD5
bb4749d67cabfd41acf633cf0956665f
SHA1
c2a2bd71a4ee523e7c5cf209f7b3656618cd3309
SHA256
8534cd1f2264de05f41807b583b636e5ad0ebb9e3ab08ab0e5bef587178c8c16
SHA512
64dcfcdb884baa808013bd8674f21400e32eb39dff1fc0316d5538bf2e20503465d03073953b335af9faab1d12467b7eabdbcc55b9a05757207b207a626cba24
SSDEEP
98304:8yKUf6vxvQz0cI8FWEVTsEj3HHUCZ5rHGIzcb78rwA+qDza+nQElEjvky:81uXIYVThnUCZ5CIa7ifa+nQzjv
Checks for missing Authenticode signature.
resource |
---|
bb4749d67cabfd41acf633cf0956665f_JaffaCakes118 |
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetProcAddress
LoadLibraryA
SetCommState
GetTempPathA
VerSetConditionMask
GetWindowsDirectoryA
LocalCompact
InterlockedDecrement
VirtualProtect
EnumSystemCodePagesW
FindFirstFileExA
ReadConsoleA
EndUpdateResourceA
DnsHostnameToComputerNameW
GetCurrentThread
GetDriveTypeA
WriteConsoleInputA
FindFirstVolumeA
SetThreadUILanguage
FatalAppExitW
GetSystemTimeAdjustment
lstrlenW
RegisterWaitForSingleObjectEx
SetLocaleInfoW
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
BackupSeek
SetCalendarInfoA
SetThreadAffinityMask
GetCPInfo
GetVolumePathNamesForVolumeNameW
SetErrorMode
GetPrivateProfileSectionNamesW
GetUserDefaultLangID
SetCommMask
GetProfileSectionW
HeapSize
GetVersionExW
LocalFree
ResetEvent
RaiseException
RtlUnwind
GetCommandLineW
HeapSetInformation
GetStartupInfoW
HeapAlloc
GetLastError
HeapFree
IsProcessorFeaturePresent
DecodePointer
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EncodePointer
TerminateProcess
GetCurrentProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
GetModuleHandleW
SetLastError
GetCurrentThreadId
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
HeapCreate
HeapDestroy
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
LeaveCriticalSection
FatalAppExitA
EnterCriticalSection
SetFilePointer
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
GetACP
GetOEMCP
IsValidCodePage
Sleep
SetConsoleCtrlHandler
FreeLibrary
InterlockedExchange
LoadLibraryW
GetLocaleInfoW
SetStdHandle
WriteConsoleW
MultiByteToWideChar
LCMapStringW
GetStringTypeW
HeapReAlloc
CreateFileW
CloseHandle
FlushFileBuffers
IsValidLocale
GetCaretPos
GetKeyboardState
IsValidAcl
DestroyPrivateObjectSecurity
EnumServicesStatusA
AccessCheckByTypeResultListAndAuditAlarmA
AdjustTokenPrivileges
ImpersonateLoggedOnUser
ReportEventA
RegEnumKeyExW
ReadEventLogW
GetSecurityDescriptorControl
RegOpenKeyA
AddAccessDeniedAce
OpenProcessToken
@Bevuzi@8
@Dotogo@12
@Tedona@8
@Yucutu@4
@Zocobo@12
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ