?AntiAVFunctionOne@@YGPAXXZ
?AntiAVFunctionTwo@@YGPAXXZ
Static task
static1
Behavioral task
behavioral1
Sample
ffe0a70502bf4a9dcdf8253a1f50f958_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ffe0a70502bf4a9dcdf8253a1f50f958_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
ffe0a70502bf4a9dcdf8253a1f50f958_JaffaCakes118
Size
96KB
MD5
ffe0a70502bf4a9dcdf8253a1f50f958
SHA1
cca5bfe77bc5ef51dc0ace19702a9cffd1eac3ec
SHA256
422ce2b9cdb08da9435464c889ae6c6dc23774c96bee31a59401ded3e36e2380
SHA512
75f8928e54c7acc27bd58aac05e6722c101db0f8160b8c0b580266cca08fb513d947348b7c8f2cea3f15f17d2e9b4126e75176294fe7673c31ed46375894b385
SSDEEP
1536:XUA3Ha9hqPNeWjO8EbCXTeT1x21EfcWYWMYGrA/LC79jwqeGdgGf6kOsyetKLe:g9hQjO8wMepx2UpYoU9HeXGf6kOs/KL
Checks for missing Authenticode signature.
resource |
---|
ffe0a70502bf4a9dcdf8253a1f50f958_JaffaCakes118 |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetModuleBaseNameA
GetProcessHeap
TlsSetValue
OpenProcess
GlobalAlloc
TerminateThread
ReadProcessMemory
CreateProcessA
TerminateProcess
VirtualAlloc
GlobalFree
VirtualFree
OpenThread
MoveFileA
GetExitCodeThread
GetModuleHandleA
GetCurrentThreadId
CloseHandle
WriteProcessMemory
SuspendThread
ResumeThread
WaitForSingleObject
HeapFree
CreateSemaphoreA
GetCurrentProcess
HeapAlloc
VirtualQuery
TlsGetValue
ReleaseSemaphore
LoadLibraryA
SetWindowTextA
PostMessageA
ShowWindow
CreateWindowExA
InvalidateRect
GetScrollInfo
SetWindowLongA
GetMenu
GetForegroundWindow
SendMessageA
DrawIcon
LoadIconA
GetWindowRect
DestroyWindow
UpdateWindow
SetScrollInfo
ModifyMenuA
MoveWindow
GetActiveWindow
DrawTextA
GetWindowInfo
GetDC
SetWindowPos
FindWindowA
ReleaseDC
Polyline
CreateCompatibleDC
SelectObject
DeleteDC
LineTo
BitBlt
MoveToEx
EndPath
BeginPath
CreatePen
_except_handler3
memset
?AntiAVFunctionOne@@YGPAXXZ
?AntiAVFunctionTwo@@YGPAXXZ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ