Afterfwb
CloseVvjfqal
Vdisuxvo
Htxpaawyt
CloseNhnojrcpoe
Ilbnesm
Static task
static1
Behavioral task
behavioral1
Sample
fa5e8af4ddaeae96084499dbff8d5526_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fa5e8af4ddaeae96084499dbff8d5526_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
fa5e8af4ddaeae96084499dbff8d5526_JaffaCakes118
Size
396KB
MD5
fa5e8af4ddaeae96084499dbff8d5526
SHA1
286159f4de595d66bb971a0f4ef43e9fe894e9bd
SHA256
739cd82fbf5326d7c889d253a09a57f7afd77d3d7ae181fcdfcbd517cecdf854
SHA512
f8006ff780c36d7da4b8b89dede6662b2f5eb0d67ab70e304ade0353bb5917ea1e83670b7147085031d07529e1fc64df6ca306046bd66ff31790e663730eda07
SSDEEP
6144:UWU6L0P9FNZT0I6bIBz6TT86fzAK9qBwh:UF87Cz6TTffzPqQ
Checks for missing Authenticode signature.
resource |
---|
fa5e8af4ddaeae96084499dbff8d5526_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetProcessVersion
OpenSemaphoreA
GetPrivateProfileStructA
WaitForDebugEvent
OpenJobObjectA
GetSystemDirectoryA
SetConsoleScreenBufferSize
GetFileAttributesExA
ReadConsoleA
WriteConsoleOutputA
IsBadStringPtrA
WriteConsoleOutputCharacterW
LZCloseFile
GetConsoleAliasExesW
GetThreadSelectorEntry
SetFileAttributesA
GetWindowsDirectoryA
GetProcessTimes
SetEvent
VirtualAlloc
IsDebuggerPresent
FindNextVolumeMountPointA
ReadConsoleOutputA
PeekConsoleInputA
GetCompressedFileSizeA
GetConsoleAliasesLengthA
GetLocalTime
GlobalHandle
GetLogicalDrives
GetFileType
IsSystemResumeAutomatic
GetSystemTimeAsFileTime
SearchPathA
GetSystemTime
GetUserDefaultLangID
GetVolumeInformationA
FindFirstVolumeMountPointA
EnumResourceNamesA
SetTimeZoneInformation
GetPriorityClass
ReleaseMutex
FindFirstFileExW
ReadConsoleOutputAttribute
GetProcessHandleCount
OpenThread
LocalFlags
OpenWaitableTimerA
GlobalFix
GetEnvironmentStringsA
GetProcessHeaps
SetFilePointerEx
WritePrivateProfileStringA
GetProfileStringA
PeekNamedPipe
GetCommState
MapUserPhysicalPagesScatter
GetFileType
DisconnectNamedPipe
lstrcmp
QueryPerformanceFrequency
GetVersionExA
HeapCreate
LZRead
GlobalMemoryStatusEx
GlobalMemoryStatus
GetNumberFormatA
GetNumberOfConsoleMouseButtons
VirtualQuery
ReadConsoleA
DeleteTimerQueueEx
GetConsoleCursorInfo
SetEndOfFile
GlobalGetAtomNameA
FreeEnvironmentStringsA
GetFileInformationByHandle
GetTickCount
WaitCommEvent
WriteConsoleOutputA
WriteConsoleOutputA
HeapSetInformation
lstrcpyA
SizeofResource
WriteConsoleOutputAttribute
GetFileTime
LoadResource
GetDevicePowerState
VerifyVersionInfoA
GetLocaleInfoA
GetProcessHeap
OpenFileMappingA
SetConsoleLocalEUDC
GetThreadLocale
SetFirmwareEnvironmentVariableA
GetCurrentConsoleFont
AddConsoleAliasA
VirtualFreeEx
GetSystemWindowsDirectoryA
SetFileAttributesA
GetFullPathNameA
GetStringTypeA
IsValidCodePage
_lclose
PeekConsoleInputA
OpenMutexA
GetConsoleOutputCP
GetConsoleCursorMode
GetConsoleOutputCP
OutputDebugStringA
SleepEx
SetVolumeMountPointA
GetModuleHandleA
CreateMutexA
GetFileType
GetTempPathA
FlushViewOfFile
GetFileTime
SetConsoleKeyShortcuts
GetFileType
GlobalAddAtomA
GetDiskFreeSpaceA
WriteConsoleOutputCharacterA
SizeofResource
ResetEvent
GetFileAttributesA
GetUserDefaultLCID
VirtualLock
GetThreadContext
TransmitCommChar
GlobalFindAtomA
GetVersionExA
GetCurrentProcessId
GetConsoleWindow
OpenFileMappingA
GetComputerNameA
WaitForMultipleObjectsEx
GetThreadTimes
ReadConsoleA
GetCurrentDirectoryA
SetProcessPriorityBoost
DeleteTimerQueue
VerifyVersionInfoA
SetEndOfFile
SetConsoleTitleA
LZOpenFileA
GetPrivateProfileIntA
GetDateFormatA
FindFirstVolumeA
VirtualFreeEx
SignalObjectAndWait
GetTickCount
lstrcmpiA
SetConsoleInputExeNameA
WaitForMultipleObjects
SetMailslotInfo
OpenProcess
GetCurrentThread
LocalAlloc
HeapSize
GetThreadLocale
SetCommBreak
OpenSemaphoreA
ResetEvent
CreateSemaphoreA
SetFilePointer
GetShortPathNameA
IsBadCodePtr
LocalShrink
GetConsoleWindow
GetPrivateProfileStringA
GetFileTime
LocalFileTimeToFileTime
WriteConsoleOutputCharacterA
ProcessIdToSessionId
SetConsoleCursor
GetVersionExA
SetFileValidData
FileTimeToDosDateTime
SetLocaleInfoA
FindResourceA
ChangeTimerQueueTimer
GetModuleHandleA
GrayStringA
DisableProcessWindowsGhosting
KillTimer
SetLayeredWindowAttributes
CharUpperBuffA
GetCursor
GetWindowTextA
DrawMenuBar
IsCharAlphaNumericW
IsMenu
EnumDisplaySettingsA
GetDlgItemTextA
EnumWindows
EnableScrollBar
InSendMessageEx
CharNextA
IsWindowInDestroy
GetInputDesktop
DlgDirListComboBoxW
SetWindowTextA
SetCursor
MessageBoxIndirectA
CharPrevA
ShowWindowAsync
LoadCursorFromFileA
CreateMDIWindowA
SetDoubleClickTime
UpdateWindow
GetClipboardSequenceNumber
ShowScrollBar
GetWindowRgn
CloseClipboard
CheckMenuItem
RecordShutdownReason
GetMessageExtraInfo
CharUpperBuffW
RemovePropA
ReleaseDC
IsCharLowerA
UnlockWindowStation
PeekMessageA
SetClassLongA
LockWindowStation
DrawMenuBarTemp
EnumWindowStationsA
MapDialogRect
DefFrameProcA
RegisterShellHookWindow
DrawTextExW
CharLowerA
LockWindowUpdate
CharUpperBuffW
GetLastInputInfo
RemovePropA
GetPropA
IsCharLowerA
SendMessageCallbackA
EnumPropsA
CharToOemBuffA
DrawTextExA
UnregisterClassA
MessageBoxTimeoutW
LoadImageA
CloseWindowStation
OpenInputDesktop
CharLowerBuffA
LoadIconA
TileChildWindows
FlashWindowEx
RecordShutdownReason
GetAltTabInfoA
MapVirtualKeyExA
CharLowerA
DestroyMenu
DestroyAcceleratorTable
CharNextExA
SetProcessDefaultLayout
DlgDirSelectExA
GetClipboardData
DrawAnimatedRects
GetCursorPos
closesocket
Afterfwb
CloseVvjfqal
Vdisuxvo
Htxpaawyt
CloseNhnojrcpoe
Ilbnesm
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ