_EJEa_ragy_nouh_a@12
_SDWds_ulmJy_cH@4
_YdQbs_swstyt@16
_ModifyRegistry@8
_SaveRegistry@12
_KkKdb_owy_kGt_Z@4
_ZsMt_zlad_bmo@8
Static task
static1
Behavioral task
behavioral1
Sample
c28a8d36a98c4fe209a24420e038669c_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c28a8d36a98c4fe209a24420e038669c_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
c28a8d36a98c4fe209a24420e038669c_JaffaCakes118
Size
1.5MB
MD5
c28a8d36a98c4fe209a24420e038669c
SHA1
55cc8251500da51e1327f67cc317c0bcf7203e69
SHA256
a2a3ca97290ba7e2610ecc6eed23270260aa4e4f6924bd0323b786e10ef984f7
SHA512
ba2d168222e6b4e3c9d93898f8bf9c6b862bdbb2048bc3a571856cbe5f1cb45b63db0f78af961f61838edaa67362cb2b57449f2b5286631a20eae4da688ef764
SSDEEP
24576:LMA1qORo+Cl5bMiJHQP3gCgK46QouYNS81v1oqrnlE651uYB41oMV:L5qO++ClC6w/UK44Nj1va6nV5B4
Checks for missing Authenticode signature.
resource |
---|
c28a8d36a98c4fe209a24420e038669c_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
ImageList_Read
ImageList_Draw
CreatePropertySheetPageA
ImageList_GetIcon
ImageList_Destroy
ChooseColorW
PageSetupDlgW
GetOpenFileNameA
PrintDlgExW
ChooseFontW
PrintDlgW
ObjectCloseAuditAlarmW
InitiateSystemShutdownW
CreateProcessAsUserW
GetSidLengthRequired
ReadEncryptedFileRaw
OpenServiceA
I_ScSetServiceBitsW
RegEnumValueW
NotifyChangeEventLog
SetServiceStatus
GetTokenInformation
ReportEventA
ValidateRect
GrayStringW
SetUserObjectInformationW
GetSysColorBrush
GetClassInfoA
EndTask
SetActiveWindow
ClipCursor
GetUpdateRect
DrawFrameControl
PostQuitMessage
GetKeyNameTextW
LoadStringA
GetClassLongW
CharToOemA
GetNextDlgGroupItem
FindWindowW
CharToOemW
EnumChildWindows
RegisterWindowMessageA
CharUpperBuffA
GetKBCodePage
RemoveMenu
ExitWindowsEx
DeferWindowPos
GetActiveWindow
AppendMenuA
CopyRect
LoadAcceleratorsA
CreatePopupMenu
SetCursor
RegisterLogonProcess
GetForegroundWindow
IsWindowUnicode
GetWindowContextHelpId
BeginPaint
GetMenuItemCount
InsertMenuW
SetWindowContextHelpId
CreateMenu
GetWindowThreadProcessId
LoadMenuIndirectA
BringWindowToTop
SetSysColors
GetWindowLongW
mouse_event
DrawTextExW
GetPropA
ValidateRgn
FindResourceExW
ResetEvent
GetModuleHandleA
SetFileTime
GetTickCount
SetHandleCount
MoveFileExW
lstrcpynA
WaitForSingleObject
GetCommConfig
GetThreadLocale
VirtualAlloc
GetStartupInfoW
GetPriorityClass
FindFirstFileA
IsDBCSLeadByteEx
WriteProfileSectionA
GetProcAddress
lstrcmpiA
lstrcatA
GetStartupInfoA
HeapUnlock
FindFirstFileW
HeapSize
FoldStringW
LoadLibraryA
lstrcmpA
GetCPInfo
CreateWaitableTimerA
SetThreadExecutionState
SetCommMask
TryEnterCriticalSection
GetComputerNameExW
GetStdHandle
HeapReAlloc
ReleaseMutex
GetLocalTime
GetDateFormatA
CreateDirectoryA
lstrlenW
GetLongPathNameW
LoadLibraryW
RaiseException
CancelWaitableTimer
GetTempPathW
GlobalFlags
VirtualLock
GetCommandLineW
Beep
SetBitmapDimensionEx
SetBkColor
DeleteMetaFile
GetMiterLimit
SetTextJustification
GetNearestColor
ExcludeClipRect
CreatePen
GetTextMetricsA
SetLayout
CreateSolidBrush
GetPaletteEntries
SetPixel
CreateDCW
GetCurrentObject
CreateCompatibleBitmap
GetTextExtentExPointW
MoveToEx
GetCharWidthA
OffsetViewportOrgEx
CreateFontIndirectA
CreateCompatibleDC
DeleteDC
srand
rand
memset
CommandLineToArgvW
_EJEa_ragy_nouh_a@12
_SDWds_ulmJy_cH@4
_YdQbs_swstyt@16
_ModifyRegistry@8
_SaveRegistry@12
_KkKdb_owy_kGt_Z@4
_ZsMt_zlad_bmo@8
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ