?Exfit2@@YAKKK@Z
?Exfit@@YAKKK@Z
Static task
static1
Behavioral task
behavioral1
Sample
fcb416a6566eb75f85cb99673b5a9a2f_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fcb416a6566eb75f85cb99673b5a9a2f_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
fcb416a6566eb75f85cb99673b5a9a2f_JaffaCakes118
Size
464KB
MD5
fcb416a6566eb75f85cb99673b5a9a2f
SHA1
c7924da615db6fbcfffe112617bbe9560dc2e7ea
SHA256
27083327bf61f821766ded6475f13a2be69b067ab9de99841c5a51d7a850a8b2
SHA512
05bcc9a23f5f443126f9b511102f2c302e62e038689ccb7b192770e0c03e8b04716c9c62d0ff0b700c46b42b1378a965f4b87100fc8133934b7c430486c294f2
SSDEEP
12288:rB3ndkjdDK9wb+Ha02MBU8Vezlmi3lHbuad+sp/p5tzE:93ndydDo6Oh2F8qlmi9bxdrpBD
Checks for missing Authenticode signature.
resource |
---|
fcb416a6566eb75f85cb99673b5a9a2f_JaffaCakes118 |
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetTickCount
Sleep
GetProcAddress
GetLastError
VirtualAlloc
ResetEvent
FlushFileBuffers
SetStdHandle
LCMapStringW
LCMapStringA
RaiseException
SetFilePointer
GetOEMCP
GetACP
GetCPInfo
IsBadWritePtr
IsBadReadPtr
HeapValidate
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
ExitProcess
HeapAlloc
DebugBreak
GetStdHandle
WriteFile
InterlockedDecrement
OutputDebugStringA
LoadLibraryA
InterlockedIncrement
GetModuleFileNameA
HeapReAlloc
HeapFree
HeapDestroy
HeapCreate
VirtualFree
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetFileType
RtlUnwind
MultiByteToWideChar
GetStringTypeA
GetStringTypeW
CloseHandle
GetActiveWindow
FindWindowA
SetFocus
SetActiveWindow
joySetThreshold
acmFilterChooseA
?Exfit2@@YAKKK@Z
?Exfit@@YAKKK@Z
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ