?Olololololo11@@YGPAXXZ
?Olololololo22@@YGPAXXZ
Static task
static1
Behavioral task
behavioral1
Sample
ea7590b23998b71ddc2398cb4b794c46_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea7590b23998b71ddc2398cb4b794c46_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
ea7590b23998b71ddc2398cb4b794c46_JaffaCakes118
Size
97KB
MD5
ea7590b23998b71ddc2398cb4b794c46
SHA1
de53a19dc24d65160e7a2aaf5cafe0e82830c0a5
SHA256
ecdea34792cd0b4512afa2a2784ef5d26e413d5d201161058a9629f03de674ee
SHA512
c70250f8784b70424714afcf6721cd3567d1d2d590f595aec86b07099ed028a2acaec2048b20d479ce97ab5790ce1f962d88b5a420a97474ea83f655ea3c1753
SSDEEP
1536:tUxjE5ysOOfigmj6Fu7zw66Mw5wu6YFUErgfVLCfGGBKkS1lCfACIGWjZB:zvlfigRFu7zbw5wjYFdSLCf1Kqf4GWZ
Checks for missing Authenticode signature.
resource |
---|
ea7590b23998b71ddc2398cb4b794c46_JaffaCakes118 |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
memset
_except_handler3
GetModuleBaseNameA
CloseHandle
CreateFileA
GetFileSize
TlsGetValue
VirtualQuery
HeapAlloc
GetCurrentProcess
HeapFree
VirtualFree
GetProcessHeap
TlsSetValue
OpenProcess
TerminateThread
ReadProcessMemory
CreateProcessA
TerminateProcess
VirtualAlloc
GlobalFree
OpenThread
MoveFileA
GetExitCodeThread
GetModuleFileNameA
GetModuleHandleA
GetCurrentThreadId
WriteProcessMemory
SuspendThread
ResumeThread
WaitForSingleObject
ReleaseSemaphore
CreateSemaphoreA
GlobalAlloc
GetActiveWindow
CreateWindowExA
InvalidateRect
SendMessageA
GetWindowRect
ModifyMenuA
SetScrollInfo
UpdateWindow
PostMessageA
ShowWindow
GetScrollInfo
SetWindowLongA
GetMenu
GetForegroundWindow
DestroyWindow
DrawTextA
GetWindowInfo
GetDC
ReleaseDC
SetWindowPos
SetWindowTextA
MoveWindow
FindWindowA
MoveToEx
BitBlt
Polyline
CreateCompatibleDC
SelectObject
DeleteDC
LineTo
CreatePen
?Olololololo11@@YGPAXXZ
?Olololololo22@@YGPAXXZ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ