?MainOneFunc@@YGPAXKK@Z
?MainTwoFunc@@YGPAXKK@Z
Static task
static1
Behavioral task
behavioral1
Sample
f0ad6ee9c88f1799b850d087dec614e5_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
f0ad6ee9c88f1799b850d087dec614e5_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
f0ad6ee9c88f1799b850d087dec614e5_JaffaCakes118
Size
96KB
MD5
f0ad6ee9c88f1799b850d087dec614e5
SHA1
f2274360b8f18005e4c141f3b531ca21a71182a1
SHA256
ac8c03b4d5388766809506b4da3514e6f79acc1b9cfd9d7158e1a808496a17f2
SHA512
1ac038a3f45c3bbf2f251bf460634de1142de599f10995c12c8eb6c5b17f96f5370664c6a7e2551254d91d93f8671e93b386b495143c2df2396e0bf49b84f099
SSDEEP
1536:v5i3SsJnjNnYnj3R5/mi2FdUqSauyzvYrnh36JUHTDaA9nlWYakn2bsxf5rarxCb:v5i31xgj3HpiDSauwIhNHTDnW1kasJ40
Checks for missing Authenticode signature.
resource |
---|
f0ad6ee9c88f1799b850d087dec614e5_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
malloc
memset
_except_handler3
GetModuleFileNameExA
HeapFree
WaitForSingleObject
VirtualFree
OpenProcess
GlobalAlloc
TerminateThread
ReadProcessMemory
HeapDestroy
HeapCreate
VirtualAlloc
GlobalFree
OpenThread
MoveFileA
GetExitCodeThread
GetModuleFileNameA
CompareStringA
GetCurrentThreadId
WriteProcessMemory
SuspendThread
GetProcessHeap
GetCurrentProcess
CreateSemaphoreA
GetFileSize
ReleaseSemaphore
LoadLibraryA
CloseHandle
HeapAlloc
GetFullPathNameA
CreateFileA
CreateWindowExA
InvalidateRect
GetScrollInfo
SetWindowLongA
GetMenu
GetForegroundWindow
SendMessageA
DrawIcon
GetWindowInfo
LoadIconA
GetWindowRect
DestroyWindow
ShowWindow
PostMessageA
SetWindowTextA
UpdateWindow
ModifyMenuA
MoveWindow
GetActiveWindow
GetDC
FindWindowA
SetScrollInfo
ReleaseDC
DrawTextA
BeginPath
EndPath
TextOutA
MoveToEx
BitBlt
LineTo
DeleteDC
SelectObject
CreateCompatibleDC
Polyline
CreatePen
GetPath
PolyDraw
?MainOneFunc@@YGPAXKK@Z
?MainTwoFunc@@YGPAXKK@Z
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ