LyuSN
_h6Vlkm6cMGUu@4
_EJrPv@4
fqF0S@20
Static task
static1
Behavioral task
behavioral1
Sample
fc5417500a3b52caf9ed2611858f57ef_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fc5417500a3b52caf9ed2611858f57ef_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
fc5417500a3b52caf9ed2611858f57ef_JaffaCakes118
Size
123KB
MD5
fc5417500a3b52caf9ed2611858f57ef
SHA1
1d16e71e51af9595a771b70fccf162cab5fc9dfb
SHA256
94db176eb5ebf66426de805bf1a0c3237700bdb9f8fa79a2df78b41cced04591
SHA512
01314f301537cd93cf23613a9b9006e92937bbc8b1cfe31b4d290c1d180d61bbbb061bb48068787d3ae6b099b0eb1149ae33db6e39d0fdd59c8265f7c1347729
SSDEEP
3072:WTvKOafTSydNifRzrxQP/kYlL5ZSxBRe0snuyOFdzjs5ueaP:WTpySRfxQP/TlL5ZSxBRz1t5jsUP
Checks for missing Authenticode signature.
resource |
---|
fc5417500a3b52caf9ed2611858f57ef_JaffaCakes118 |
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetFileType
GetCommandLineW
lstrcmpA
MoveFileA
GetCommandLineA
GlobalAlloc
SetHandleCount
GlobalFindAtomA
GetCurrentThreadId
GetModuleHandleW
LoadLibraryA
LocalAlloc
GetOEMCP
GetModuleHandleA
GetVersionExA
GetProcAddress
WaitForSingleObject
Sleep
lstrcmpiA
CreateThread
GetTickCount
GetModuleFileNameA
GetDiskFreeSpaceA
IsBadHugeReadPtr
GetCurrentProcess
MulDiv
LoadResource
GetLocaleInfoA
GetStdHandle
ReadFile
GetCurrentProcessId
lstrcpyA
GetLastError
LoadLibraryExA
HeapAlloc
GetLocalTime
FormatMessageA
FreeLibrary
ExitProcess
SetFilePointer
EnterCriticalSection
VirtualAllocEx
SelectPalette
GetPaletteEntries
BitBlt
GetTextAlign
SetPixel
GetCurrentPositionEx
CreateBitmap
SetBkColor
GetTextColor
GetWindowRect
KillTimer
ShowWindow
GetDC
CharLowerA
RegisterWindowMessageA
UnhookWindowsHookEx
DrawIcon
SetRect
SystemParametersInfoA
FrameRect
SetWindowTextA
SetWindowLongA
DefWindowProcA
DrawEdge
DrawFrameControl
ScrollWindow
DrawIconEx
TranslateMessage
LoadStringA
EnumThreadWindows
RegisterClipboardFormatA
GetClipboardData
GetKeyboardLayout
DestroyIcon
PostMessageA
GetMenuItemID
wsprintfA
GetTopWindow
GetScrollInfo
ReleaseDC
EnumChildWindows
DispatchMessageA
IsWindowVisible
DestroyMenu
IsZoomed
GetWindowThreadProcessId
IsWindow
SetWindowPlacement
RemovePropA
GetCursor
LoadBitmapA
CharNextA
GetMenuItemCount
EnumWindows
MessageBoxA
IsWindowEnabled
CharUpperBuffA
SetMenu
GetMenu
OpenClipboard
ActivateKeyboardLayout
PeekMessageA
GetMessagePos
GetSysColor
GetKeyboardLayoutNameA
TrackPopupMenu
SetClassLongA
CharToOemA
MapWindowPoints
SetWindowPos
SetCapture
GetLastActivePopup
EmptyClipboard
RemoveMenu
IsDialogMessageA
GetSysColorBrush
GetDesktopWindow
LoadCursorA
GetSystemMenu
FindWindowA
GetWindowLongA
DispatchMessageW
CharNextW
LoadIconA
SetWindowLongW
SetFocus
GetKeyboardLayoutList
ShowScrollBar
DrawAnimatedRects
WindowFromPoint
CallNextHookEx
GetScrollRange
InvalidateRect
GetDCEx
GetFocus
EndPaint
GetActiveWindow
GetClientRect
SetActiveWindow
RedrawWindow
CreatePopupMenu
CharUpperA
SetPropA
GetCursorPos
DestroyCursor
TranslateMDISysAccel
OemToCharA
CharLowerBuffA
IsDialogMessageW
GetClassLongA
GetKeyboardType
IsCharUpperA
EnableMenuItem
SetForegroundWindow
GetPropA
ClientToScreen
OffsetRect
InsertMenuA
SetScrollRange
EnableWindow
InsertMenuItemA
GetKeyState
CallWindowProcA
MapVirtualKeyA
GetSubMenu
ChildWindowFromPoint
CreateMenu
SetMenuItemInfoA
InflateRect
SetCursor
IsCharLowerA
EnableScrollBar
RegCreateKeyA
RegDeleteValueA
RegQueryValueExA
RegOpenKeyExA
clock
memcpy
wcscspn
atol
rand
calloc
sqrt
exit
mbstowcs
_acmdln
swprintf
wcschr
LyuSN
_h6Vlkm6cMGUu@4
_EJrPv@4
fqF0S@20
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ