FfdYpvvdxuJgkqeuxJfqxQx
DrrOzvb
StquAiehPztqgumUg
Static task
static1
Behavioral task
behavioral1
Sample
e214b8c2041c0af98ce0874046f11972_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e214b8c2041c0af98ce0874046f11972_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
e214b8c2041c0af98ce0874046f11972_JaffaCakes118
Size
142KB
MD5
e214b8c2041c0af98ce0874046f11972
SHA1
427b440c501d45cdda79dbf83a53441456117f12
SHA256
6226b0a4eef8b29367aea512e825459c9e913d884e9c4acd333efb5999a3badf
SHA512
94279f3bcb705e726965dd131c57a54d3ad8cc48db0f8e8ab2bafa364e88f0003754f3b1ecac9457dc8d395dcd3e0380debf03edd7f47d365fe76c40be0c6937
SSDEEP
3072:JdflNP+vmbw5hUljm7HdBOqT/ou/HYmv8RHuEsQ7t1tYUhZyst:JddN2ow7U9m7eqkQHY7Dsw1tYUry
Checks for missing Authenticode signature.
resource |
---|
e214b8c2041c0af98ce0874046f11972_JaffaCakes118 |
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
SetCurrentDirectoryA
GetSystemWindowsDirectoryW
TerminateProcess
WritePrivateProfileSectionW
GetModuleHandleA
FormatMessageA
VirtualProtect
CreateMutexA
SetCurrentDirectoryW
VirtualAlloc
ReadFile
LoadLibraryW
VirtualFree
SetConsoleMode
LockResource
ExitThread
WritePrivateProfileSectionA
OutputDebugStringA
TlsGetValue
GetNumberFormatW
GetExitCodeProcess
SetFileTime
TlsAlloc
SetFilePointer
LeaveCriticalSection
GetStringTypeA
GetProcAddress
ResetEvent
memset
__winitenv
strerror
__set_app_type
IsWindow
wsprintfA
CallWindowProcW
LoadCursorW
DrawEdge
CreateWindowExA
CopyRect
GetForegroundWindow
DispatchMessageW
GetClipboardData
LineTo
GetRegionData
CreateSolidBrush
GetTextExtentPoint32W
GetTextMetricsW
CreateBitmap
SetStretchBltMode
DeleteDC
DeleteObject
StretchBlt
GetStockObject
SelectPalette
SetBkMode
CreateCompatibleBitmap
CreateRoundRectRgn
TextOutW
SetTextColor
BitBlt
ExtTextOutW
lineGetCallInfoA
lineAgentSpecific
lineMakeCallW
lineGetAddressCaps
tapiGetLocationInfoW
FfdYpvvdxuJgkqeuxJfqxQx
DrrOzvb
StquAiehPztqgumUg
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ