?Exfit2@@YAKKK@Z
?Exfit@@YAKKK@Z
Static task
static1
Behavioral task
behavioral1
Sample
d4ccb0b9274f3e91d5fab780f53f0c19_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d4ccb0b9274f3e91d5fab780f53f0c19_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
d4ccb0b9274f3e91d5fab780f53f0c19_JaffaCakes118
Size
464KB
MD5
d4ccb0b9274f3e91d5fab780f53f0c19
SHA1
b02a3e943fb7ad5be57d7b59de1ba9294cbcf1b1
SHA256
13dbc5db3777de4d5aa778ff79e1790f79b132adfc403ae46e15eb82ceef9942
SHA512
a25fa9c8682ee97d370491d68d4ebd03dbbcc6ecc71aaeb2801e168c707a0a3337f037362bc9bacbe0aff60d7d109f2c90a9757790da3410efd8cbc4274a6f20
SSDEEP
12288:VB3ndkjWK9wb+Ha02MBU8Vezlmi3lHbuad+sp/p5tzT:/3ndyWo6Oh2F8qlmi9bxdrpBD
Checks for missing Authenticode signature.
resource |
---|
d4ccb0b9274f3e91d5fab780f53f0c19_JaffaCakes118 |
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetTickCount
Sleep
GetProcAddress
GetLastError
VirtualAlloc
ResetEvent
FlushFileBuffers
SetStdHandle
LCMapStringW
LCMapStringA
RaiseException
SetFilePointer
GetOEMCP
GetACP
GetCPInfo
IsBadWritePtr
IsBadReadPtr
HeapValidate
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
ExitProcess
HeapAlloc
DebugBreak
GetStdHandle
WriteFile
InterlockedDecrement
OutputDebugStringA
LoadLibraryA
InterlockedIncrement
GetModuleFileNameA
HeapReAlloc
HeapFree
HeapDestroy
HeapCreate
VirtualFree
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetFileType
RtlUnwind
MultiByteToWideChar
GetStringTypeA
GetStringTypeW
CloseHandle
GetActiveWindow
FindWindowA
SetFocus
SetActiveWindow
joySetThreshold
acmFilterChooseA
?Exfit2@@YAKKK@Z
?Exfit@@YAKKK@Z
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ