InitXjmhoxfpfl
Yiqhfhy
ReadNrexwrm
AddTquencitld
IsUbovdywg
Bvcftqrs
OpenBqwjgqp
BeginYwwklkpubnt
EndOxbkcxqlko
Gqspgmxovyj
Ljsbahjjh
Wpwmyvd
Nniwxcn
CreateTxjxyqrl
EndGbbkvxrsebl
Xspfspra
Wicanmbf
Nchxsyltbk
Static task
static1
Behavioral task
behavioral1
Sample
d7016e3657908fbdefe1c71a5f20782a_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d7016e3657908fbdefe1c71a5f20782a_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
d7016e3657908fbdefe1c71a5f20782a_JaffaCakes118
Size
40KB
MD5
d7016e3657908fbdefe1c71a5f20782a
SHA1
0a8dac63cc30d6672e04e49585360405ff650b06
SHA256
5c66a87307c47fe5a74af25f344583911feae4f689683d2be6f1ee46ea4284af
SHA512
cb9abbccb0dec8eb85a13dacafa6b2825364ccb9f30343b42a4b2b283558bf38672c8af91a25878a9870982824d50a3d5c5962ddb874f70a268eefd9cb69771c
SSDEEP
768:EDY5PRz6m20rubTtR6weprYwbRCMa8f+gsyDYm:R9R+OKPQpswbLz+vm
Checks for missing Authenticode signature.
resource |
---|
d7016e3657908fbdefe1c71a5f20782a_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
AllocConsole
GetLogicalDriveStringsA
ExpandEnvironmentStringsA
EnumResourceNamesA
ReadConsoleOutputCharacterA
GetConsoleCommandHistoryA
GetConsoleAliasA
FindCloseChangeNotification
OpenEventA
GlobalGetAtomNameA
IsProcessorFeaturePresent
SetVolumeMountPointA
GetSystemDefaultUILanguage
GetTempPathA
GetCurrentProcessId
VirtualAlloc
SetCommBreak
GetCurrentThreadId
ReadConsoleA
HeapCreate
UpdateResourceA
FileTimeToDosDateTime
DeleteTimerQueue
WriteFileEx
GetStdHandle
GetFileAttributesA
GetCurrentDirectoryA
GetProcessAffinityMask
LockFile
EndUpdateResourceA
lstrcpyA
CreateTimerQueueTimer
MoveFileWithProgressA
GetModuleHandleA
GetNumberFormatA
GetBinaryType
ConvertDefaultLocale
GetThreadSelectorEntry
Thread32Next
BeginUpdateResourceA
SetFileAttributesA
GetSystemTimes
GetFileTime
FreeResource
LZStart
GetDriveTypeA
SetVolumeLabelW
FlushInstructionCache
SetCalendarInfoA
LocalUnlock
FindNextVolumeMountPointA
ReleaseMutex
ReleaseSemaphore
GetLocaleInfoA
GetThreadContext
EnumSystemLocalesA
FileTimeToLocalFileTime
IsBadStringPtrA
GetConsoleMode
LoadLibraryA
IsValidCodePage
SetConsoleWindowInfo
LoadLibraryExA
GetConsoleCursorMode
FindResourceExA
GetDiskFreeSpaceExA
GetPrivateProfileSectionNamesW
FindNextVolumeA
SetConsoleTextAttribute
GetTimeFormatA
GetDiskFreeSpaceA
WriteConsoleOutputA
GlobalLock
SetVolumeLabelA
GetCurrentProcess
DeleteTimerQueueEx
SetLocalPrimaryComputerNameA
CommConfigDialogA
ProcessIdToSessionId
FindFirstVolumeMountPointA
GetConsoleKeyboardLayoutNameA
GetCommState
GetSystemInfo
ClearCommBreak
GetProcessIoCounters
SetFileValidData
ReadConsoleInputA
OpenSemaphoreA
LCMapStringA
GetSystemTimes
GetEnvironmentVariableA
GetThreadLocale
lstrcatA
GetWindowsDirectoryA
GetCommTimeouts
ReadConsoleOutputAttribute
FindNextVolumeW
FlushViewOfFile
GlobalUnfix
GetBinaryTypeA
FindResourceExW
ReadConsoleInputA
GetConsoleTitleA
RemoveDirectoryA
GetDefaultCommConfigA
IsBadCodePtr
GetStartupInfoA
DhcpUndoRequestParams
SQLSetStmtAttr
SQLExecute
Direct3DCreate9
InitXjmhoxfpfl
Yiqhfhy
ReadNrexwrm
AddTquencitld
IsUbovdywg
Bvcftqrs
OpenBqwjgqp
BeginYwwklkpubnt
EndOxbkcxqlko
Gqspgmxovyj
Ljsbahjjh
Wpwmyvd
Nniwxcn
CreateTxjxyqrl
EndGbbkvxrsebl
Xspfspra
Wicanmbf
Nchxsyltbk
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE