?uekaSpkkvluJJr@@YGPAHFG@Z
?zyuCudacMRYoRK@@YGPAG_ND@Z
Static task
static1
Behavioral task
behavioral1
Sample
debb6fd6d4b1ad05f87a7799fb199ef8_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
debb6fd6d4b1ad05f87a7799fb199ef8_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
debb6fd6d4b1ad05f87a7799fb199ef8_JaffaCakes118
Size
144KB
MD5
debb6fd6d4b1ad05f87a7799fb199ef8
SHA1
cc0d83acc15c36ab4daba58a9909f14644f75607
SHA256
8cf5d2924e4f1f06fe085d91bc69f4c8e37e67b20b5febedc7b6b69730027fab
SHA512
398ac0028b6f52f0cdf56488fc97a40188006accbc7a6c6da7b175c93e48a74f94d43947acb9130503432c37e36437d62af8dfe01806d64832a289acd6b95345
SSDEEP
1536:CNuf/WHodfNO5L56mUFqhv4s/bm8rXlIoodQoIrkJ:bf++oI/FkvD/bDhIFar
Checks for missing Authenticode signature.
resource |
---|
debb6fd6d4b1ad05f87a7799fb199ef8_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetDesktopWindow
RemovePropW
LoadCursorW
GrayStringW
GetWindow
GetSystemMetrics
InSendMessage
GetWindowContextHelpId
CreateAcceleratorTableW
CreateDialogIndirectParamW
GetParent
PathRemoveFileSpecW
ChrCmpIW
PathCanonicalizeW
PathCommonPrefixW
StrIsIntlEqualA
ReplaceTextW
FindTextW
ChooseFontW
ChooseColorW
SetFilePointer
LoadLibraryExW
IsBadWritePtr
SetThreadPriority
OpenSemaphoreW
ExitProcess
GetModuleHandleExW
FreeResource
memset
ExtTextOutA
RoundRect
GetBitmapBits
Polyline
GetTextExtentPoint32A
TextOutA
?uekaSpkkvluJJr@@YGPAHFG@Z
?zyuCudacMRYoRK@@YGPAG_ND@Z
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ