JGXGDabyWtuDwZmcz@12
_AddMessageToQueue@8
_RemoveMessageFromQueue@12
UbxZKgyMkkJkfv@4
UgqOndoeocgbYXg@4
GdzIQwqntrep@8
UzBRfVtqcbadea@16
Static task
static1
Behavioral task
behavioral1
Sample
e18a3de82ce649815218547a21b62444_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e18a3de82ce649815218547a21b62444_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
e18a3de82ce649815218547a21b62444_JaffaCakes118
Size
31KB
MD5
e18a3de82ce649815218547a21b62444
SHA1
44bbb4f1a734e5a66771f1b4aace568f59cd7d7a
SHA256
c6214968487307803fb3c4610d2e324ca3e14172e5cef8fdab20a0fd5efa2d79
SHA512
78076858a95d0f35fab4ca99bfc9eeab21715894758afc1a5d995e7ae5c0cdfa4cefbcc0ef379ababbf5e0f363ee2c618b43fe0047a8c4c4d2de28cb156807d0
SSDEEP
384:sfg89h/q0OMUyFcHmLmPB9BUGhwdStDB5HDz7dqAagoZ78qPRGmGGU:sfJ95qSqHmLmPB3pXpB5EtFDFU
Checks for missing Authenticode signature.
resource |
---|
e18a3de82ce649815218547a21b62444_JaffaCakes118 |
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
HeapUnlock
IsBadReadPtr
IsDBCSLeadByte
MoveFileW
WaitForDebugEvent
GetTickCount
HeapFree
FindClose
ReadFile
CreateSemaphoreA
SearchPathA
DosDateTimeToFileTime
UnregisterWait
GetProcessAffinityMask
WriteConsoleInputA
ConnectNamedPipe
InterlockedExchange
GetConsoleMode
SizeofResource
TlsAlloc
FreeConsole
GetModuleHandleA
IsBadWritePtr
GetNextVDMCommand
DuplicateHandle
GetFileType
TlsGetValue
TlsSetValue
GlobalAddAtomW
RegisterWaitForSingleObject
lstrcatA
GetOverlappedResult
GlobalFindAtomW
CreateEventW
FreeResource
lstrcmpW
GetDriveTypeW
GetACP
GetProcessVersion
HeapAlloc
SetCurrentDirectoryW
GetCommandLineA
GetUserDefaultLCID
GlobalGetAtomNameW
lstrcpyA
TlsFree
WaitForSingleObject
ExitVDM
ExpandEnvironmentStringsW
LoadLibraryA
QueryDosDeviceW
OpenEventA
SystemTimeToFileTime
GetTempFileNameA
FreeEnvironmentStringsA
FindFirstChangeNotificationW
GetThreadContext
HeapValidate
InitAtomTable
SetCommBreak
CancelIo
GetNextDlgGroupItem
CreateAcceleratorTableW
GetWindowDC
IsWindowEnabled
DispatchMessageW
DrawMenuBar
DestroyAcceleratorTable
LoadImageW
WindowFromPoint
TranslateMessage
GetMessageTime
WaitMessage
wvsprintfW
EndPaint
PostQuitMessage
GetWindowRect
PostMessageA
SetWindowPos
EnumChildWindows
ValidateRect
SetWindowStationUser
SystemParametersInfoW
IsCharAlphaNumericW
GetTopWindow
IsWindowVisible
GetSystemMenu
GetDC
IsCharAlphaW
RedrawWindow
GetMenuItemInfoW
LoadIconA
MoveWindow
DestroyWindow
GetClientRect
GetKeyboardType
IsIconic
GetMessageW
GetClassLongW
CreateMenu
CharUpperW
DdePostAdvise
GetFocus
TranslateAcceleratorA
ActivateKeyboardLayout
BeginPaint
GetSysColor
InsertMenuItemW
ShowWindow
CloseWindow
mouse_event
DestroyIcon
ExtTextOutW
SetROP2
GetRgnBox
ScaleWindowExtEx
GetLayout
SelectPalette
GetFontData
DeleteMetaFile
DeleteDC
GetObjectA
CreateSolidBrush
UpdateColors
SetLayout
SetBkColor
CreatePen
CreateBrushIndirect
DrawEscape
Polygon
SymLoadModule
SymGetOptions
SymInitialize
SymGetModuleInfoW
SymMatchFileName
GetTimestampForLoadedLibrary
_vsnprintf
fputs
time
iswprint
longjmp
wcsrchr
fflush
memset
JGXGDabyWtuDwZmcz@12
_AddMessageToQueue@8
_RemoveMessageFromQueue@12
UbxZKgyMkkJkfv@4
UgqOndoeocgbYXg@4
GdzIQwqntrep@8
UzBRfVtqcbadea@16
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ