Mpb
Qqnzbykt
Static task
static1
Behavioral task
behavioral1
Sample
f9cb436b9eec765e4456fe5352742c80_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
f9cb436b9eec765e4456fe5352742c80_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
f9cb436b9eec765e4456fe5352742c80_JaffaCakes118
Size
39KB
MD5
f9cb436b9eec765e4456fe5352742c80
SHA1
bc4f256a6fc4eda3272dcd8c5efc97bf40bd7e43
SHA256
7ceb294abd706075801856594d94f24c46c1732343f4592c542d4f80d1b2b1f0
SHA512
200248fa4b395ba6b07c384e08ba03d77465874a68ec77159b31925658d11095901892363c7162925056f158baf0c383361dfeaa8aec42a05ea55e29a13816e8
SSDEEP
768:1kz1gPvYtbYj7R5/bqzXl+BIzwMLPxWWfTW7fk:1kz17bYj7R5/q+IxWW7
Checks for missing Authenticode signature.
resource |
---|
f9cb436b9eec765e4456fe5352742c80_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
CloseHandle
EnumResourceNamesA
ExitProcess
GetACP
GetCommandLineA
GetFileSize
GetModuleHandleA
GetOEMCP
GetStartupInfoA
GetTimeFormatA
LoadLibraryA
RtlUnwind
SetUnhandledExceptionFilter
TlsGetValue
VirtualAlloc
WriteFile
lstrcmpA
lstrcpyA
lstrcpynA
lstrlenA
ToAscii
ShowCursor
ShowCaret
SetFocus
RegisterClassA
LoadAcceleratorsW
GetMenu
EnableWindow
DestroyIcon
DestroyCursor
DeleteMenu
CreateDesktopW
CreateDesktopA
CharNextA
ShowScrollBar
RegQueryValueA
LsaClose
LsaCreateTrustedDomainEx
LsaDeleteTrustedDomain
LsaEnumeratePrivilegesOfAccount
LsaEnumerateTrustedDomains
LsaGetQuotasForAccount
LsaGetUserName
LsaICLookupNames
LsaLookupNames
LsaLookupPrivilegeDisplayName
RegOpenKeyExA
__vbaAryVarVarg
__vbaBoolStr
__vbaCastObjVar
__vbaFileSeek
__vbaFileCloseAll
__vbaExitEachAry
__vbaDateVar
__vbaCyVar
__vbaCyInt
__vbaCyI4
__vbaCopyBytes
__vbaCheckType
__vbaBoolErrVar
DirectInputCreateA
DirectInputCreateW
DirectInputCreateEx
Mpb
Qqnzbykt
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ