Ft
Hto
Tevkno
Static task
static1
Behavioral task
behavioral1
Sample
d4fa134b116fc654db0c0df06c337792_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d4fa134b116fc654db0c0df06c337792_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
d4fa134b116fc654db0c0df06c337792_JaffaCakes118
Size
116KB
MD5
d4fa134b116fc654db0c0df06c337792
SHA1
3724ef7b8d858273adf74667929d3b9206fc4d90
SHA256
13dd99a4c7c6b8067c74a6eb3b261be05a4388e8754c8823ab0b4ae3097fd1e5
SHA512
bec63fcb51377fb7e910175f564bf83d673602378b7ddc3d2d3165b556a528507cc7d24666979821bfe1a96bdedd06652f13cd87f659be709ec1e2aa56e17bb4
SSDEEP
3072:CjrOxeiixXp+ULTy+1hUt/nnGK7h/X+zH4W+W:p5ULTh1hUtRc+
Checks for missing Authenticode signature.
resource |
---|
d4fa134b116fc654db0c0df06c337792_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
CloseHandle
CompareStringA
ExitProcess
GetACP
GetCommandLineA
GetModuleHandleA
GetOEMCP
GetPrivateProfileStringA
GetStartupInfoA
GetSystemTime
HeapAlloc
RtlUnwind
SetEndOfFile
SetLastError
SetUnhandledExceptionFilter
TlsFree
UnmapViewOfFile
VirtualFree
lstrcatA
lstrcpyA
ToAscii
ShowOwnedPopups
OemToCharBuffA
LoadAcceleratorsW
GetFocus
EndDeferWindowPos
EnableWindow
DestroyIcon
CharPrevA
GetWindowTextA
LsaEnumerateTrustedDomains
LsaGetQuotasForAccount
LsaGetRemoteUserName
LsaLookupNames
LsaLookupPrivilegeDisplayName
__vbaCyStr
__vbaCyInt
__vbaCyAbs
__vbaExitEachVar
__vbaAryConstruct2
__vbaExitEachColl
__vbaExitEachAry
__vbaEraseKeepData
__vbaDateVar
__vbaCyVar
DirectInputCreateA
DirectInputCreateEx
DirectInputCreateW
Ft
Hto
Tevkno
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ