OpenCfhbwukxsav
Wtjeofoge
InitKnbbmian
Unncnmtf
InitYyxoafhisu
Bawyudaigd
Vgmvxbhhgib
Jtlvdhbxpe
InitUhlfjmn
AddFodvckvwd
Rxyxsmyp
SetNubthrr
WriteWudkcorr
Tnohhaiil
Gtgswdbh
SetVlihotqtby
Fbhstffun
Jekicndxrp
Static task
static1
Behavioral task
behavioral1
Sample
ce240b0b3995240961f5c74d6015c0f3_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ce240b0b3995240961f5c74d6015c0f3_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
ce240b0b3995240961f5c74d6015c0f3_JaffaCakes118
Size
146KB
MD5
ce240b0b3995240961f5c74d6015c0f3
SHA1
92ef61df3866d18dd3c55d452ef5af64ebc1ca98
SHA256
8eda4c032609bf2b72477d94b4d0964fc9ff98381cf7eef3e059ea222b1e05b8
SHA512
4c91ee9492974661ecee758650d54bb83c8b0a712fde7c31678d6f61147e02784b8c169ec6ff36722c038d98b158b4bb059157a041d3fb6b9a923f2335683bf2
SSDEEP
768:cSuBtD4ryrThYU5ySd5wL5FR3sD1MjDuF2eV9Sb5D2hhY0X+jncIG0fEY:rHiThYuhkOpMChkNDSLOjnch0fE
Checks for missing Authenticode signature.
resource |
---|
ce240b0b3995240961f5c74d6015c0f3_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetDateFormatA
ReadConsoleInputA
GlobalSize
LZInit
GetDiskFreeSpaceExA
GetConsoleCursorInfo
CreateEventA
OpenThread
GetDriveTypeA
GetProcessIoCounters
FindNextVolumeMountPointA
FindNextVolumeW
LoadLibraryA
DeleteTimerQueueTimer
SetConsoleIcon
ReadFileScatter
GetFileTime
WriteConsoleOutputCharacterW
OpenFileMappingA
GetProfileIntA
WaitForSingleObject
GetConsoleFontSize
SetUnhandledExceptionFilter
WriteConsoleOutputA
SetVolumeLabelA
UnlockFile
EnumTimeFormatsA
MapUserPhysicalPages
GetProcessId
GetThreadContext
VirtualAlloc
WriteConsoleOutputCharacterA
GetBinaryTypeA
OpenEventA
OpenSemaphoreA
GetUserDefaultLangID
PurgeComm
SearchPathA
PeekConsoleInputA
GetThreadContext
GetCurrentThread
TerminateProcess
GetThreadPriorityBoost
GetStdHandle
GetCurrentProcess
GetDllDirectoryA
FlushInstructionCache
WriteProfileSectionA
GetLocaleInfoA
HeapQueryInformation
SetVolumeMountPointA
ReadConsoleA
GetStringTypeExW
GetProcessHeap
GetConsoleCommandHistoryA
GetPrivateProfileIntA
GetLogicalDriveStringsA
GetModuleHandleA
lstrlenA
Module32Next
GetAtomNameA
GetSystemWindowsDirectoryA
SetFilePointerEx
ReadConsoleOutputCharacterA
VirtualQuery
SetConsoleInputExeNameA
lstrcmp
VirtualAlloc
AllocConsole
CopyFileExW
CommConfigDialogA
UpdateResourceA
FindNextVolumeA
SetPriorityClass
ReleaseMutex
RemoveDirectoryA
GetFullPathNameA
CreateDirectoryExA
WideCharToMultiByte
IsProcessorFeaturePresent
CreateDirectoryA
SetProcessPriorityBoost
TransmitCommChar
HeapValidate
FindFirstChangeNotificationA
GetFileInformationByHandle
LockFile
SetConsoleHardwareState
SetFileAttributesA
ChangeTimerQueueTimer
WriteConsoleOutputAttribute
GetModuleFileNameA
QueryPerformanceFrequency
SetThreadAffinityMask
GetConsoleKeyboardLayoutNameA
SetConsoleWindowInfo
FindNextVolumeMountPointW
SetVolumeLabelW
GetConsoleWindow
SetConsoleOutputCP
GetWindowsDirectoryA
ReleaseSemaphore
SetComputerNameA
FindCloseChangeNotification
SetLocalPrimaryComputerNameA
GetNamedPipeInfo
DhcpUndoRequestParams
SQLExecute
SQLSetStmtAttr
Direct3DCreate9
OpenCfhbwukxsav
Wtjeofoge
InitKnbbmian
Unncnmtf
InitYyxoafhisu
Bawyudaigd
Vgmvxbhhgib
Jtlvdhbxpe
InitUhlfjmn
AddFodvckvwd
Rxyxsmyp
SetNubthrr
WriteWudkcorr
Tnohhaiil
Gtgswdbh
SetVlihotqtby
Fbhstffun
Jekicndxrp
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE