WjEvcsknDdjbmGf
ZkeKtwtrbRbrpe
MzhrrkxJrzpEpe
Static task
static1
Behavioral task
behavioral1
Sample
bc5ab149e2527a1007286446bf1117e0_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
bc5ab149e2527a1007286446bf1117e0_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
bc5ab149e2527a1007286446bf1117e0_JaffaCakes118
Size
65KB
MD5
bc5ab149e2527a1007286446bf1117e0
SHA1
656334d1743f4e816dd194f97739ce48b95758b8
SHA256
38252aa50884d666b9fd7f31d5967e540f4682b676a5870d4375c49861e6d460
SHA512
55a377767a6b4fc5663f668b7993de8ef83077302b8fa4a74b02f1fff6168f60d5e38e4c5b9dea4eae9a20e13910be00d58a5e4efda4a3a72133730424e294ad
SSDEEP
1536:Bt0R7qPjNebZHSOMqTFrjgSt4lW5wGyPwBH50Py7I:m7q5ebZ3Mqt1wzGyoAy7
Checks for missing Authenticode signature.
resource |
---|
bc5ab149e2527a1007286446bf1117e0_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Beep
DisableThreadLibraryCalls
GetLongPathNameW
IsBadReadPtr
GetLastError
VirtualProtect
GetSystemWindowsDirectoryW
FindNextFileA
CopyFileExW
GetModuleHandleA
LoadLibraryA
GetCurrencyFormatA
CreateWaitableTimerW
VirtualAlloc
ExitProcess
CopyFileA
CreateWaitableTimerA
OutputDebugStringA
GetCurrentDirectoryW
LocalReAlloc
LocalHandle
memcpy
_fstat
fread
_wfindfirst64
_iob
getchar
_ismbbkana
ctime
_putws
_mbcasemap
_mbsstr
wcscmp
isupper
sprintf
vprintf
?set_new_handler@@YAP6AXXZP6AXXZ@Z
getc
wcslen
_mbschr
_chsize
GetWindowLongW
CreateWindowExW
SendDlgItemMessageW
LoadStringA
OffsetRect
LoadStringW
LoadImageW
GetSysColor
CreatePopupMenu
GetMenu
ModifyMenuA
DispatchMessageW
LoadCursorW
EnumDesktopWindows
GetParent
GetKeyState
IsWindowEnabled
GetClassWord
LoadCursorFromFileA
GetDlgItem
GetStockObject
CreateCompatibleBitmap
CreateRectRgn
GetTextFaceW
EqualRgn
GetTextExtentExPointW
SetRectRgn
GetRgnBox
GetDeviceCaps
WjEvcsknDdjbmGf
ZkeKtwtrbRbrpe
MzhrrkxJrzpEpe
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ