Detect
DevSetup
Help
Install
Scan
Uninstall
Static task
static1
Behavioral task
behavioral1
Sample
04f8df61c4d72c843c8bfcc66d5d6584_JaffaCakes118.exe
Resource
win7-20240903-en
Target
04f8df61c4d72c843c8bfcc66d5d6584_JaffaCakes118
Size
800KB
MD5
04f8df61c4d72c843c8bfcc66d5d6584
SHA1
5f0899ab1747d3e9e2f84c455b3a186cd85a5532
SHA256
affd9587cd55126dc1be0f2f98442d6d3b54a4a3b02719398c501ead74c9d2ae
SHA512
083005c9de8273187bd94173a753d340ea88b8dadb7d020ac7e4bfb30ed599f0cfef76b95ad95f3caa5f172109ab867e49d03826a5b517544342f814d3846fa7
SSDEEP
12288:UbT6qtmohox+O5EA9T8le5GlWihVRmUVM/MgoZbuTG/c:2qlpT8lCGE+mUVM/kp/c
Checks for missing Authenticode signature.
resource |
---|
04f8df61c4d72c843c8bfcc66d5d6584_JaffaCakes118 |
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
SetupDiGetClassDevsA
SetupDiEnumDeviceInfo
SetupDiGetDeviceRegistryPropertyA
PathFileExistsA
UpdateDriverForPlugAndPlayDevicesA
lstrcmpA
GlobalFlags
GetCPInfo
GetOEMCP
GetCurrentProcess
CreateFileA
ReadFile
WriteFile
SetFilePointer
FlushFileBuffers
SetEndOfFile
RtlUnwind
GetStartupInfoA
ExitProcess
HeapAlloc
HeapFree
RaiseException
HeapSize
HeapReAlloc
TerminateProcess
GetACP
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
SetUnhandledExceptionFilter
IsBadReadPtr
IsBadCodePtr
SetStdHandle
GetProcessVersion
LoadLibraryA
FreeLibrary
lstrcatA
GlobalGetAtomNameA
lstrcmpiA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
lstrcpyA
GetCurrentThreadId
TlsGetValue
LocalReAlloc
TlsSetValue
GlobalAlloc
GlobalReAlloc
GlobalLock
GlobalHandle
GlobalUnlock
GlobalFree
TlsAlloc
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
lstrcpynA
SetLastError
MultiByteToWideChar
WideCharToMultiByte
InterlockedDecrement
InterlockedIncrement
GetTickCount
GetModuleFileNameA
FindFirstFileA
FindNextFileA
FindClose
GetWindowsDirectoryA
LocalFree
LocalAlloc
lstrlenA
Sleep
GetModuleHandleA
GetProcAddress
GetVersion
CreateProcessA
WaitForSingleObject
GetExitCodeProcess
CreateSemaphoreA
GetLastError
CloseHandle
GetCommandLineA
InterlockedExchange
CopyRect
GetClientRect
AdjustWindowRectEx
SetFocus
GetSysColor
MapWindowPoints
PostMessageA
LoadIconA
SetWindowTextA
LoadCursorA
GetSysColorBrush
ReleaseDC
GetDC
GetClassNameA
PtInRect
ClientToScreen
PostQuitMessage
DestroyMenu
TabbedTextOutA
DrawTextA
GrayStringA
GetTopWindow
GetCapture
WinHelpA
RegisterClassA
GetMenu
GetMenuItemCount
GetSubMenu
GetMenuItemID
GetDlgItem
GetWindowTextA
GetDlgCtrlID
DefWindowProcA
DestroyWindow
CreateWindowExA
GetClassLongA
SetPropA
GetPropA
CallWindowProcA
RemovePropA
GetMessageTime
GetMessagePos
GetForegroundWindow
SetForegroundWindow
GetWindow
SetWindowLongA
SetWindowPos
RegisterWindowMessageA
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindowRect
GetSystemMetrics
GetMenuCheckMarkDimensions
LoadBitmapA
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
DispatchMessageA
GetKeyState
CallNextHookEx
PeekMessageA
SetWindowsHookExA
UnhookWindowsHookEx
GetParent
GetLastActivePopup
IsWindowEnabled
GetWindowLongA
SendMessageA
GetClassInfoA
EnableWindow
LoadStringA
MessageBoxA
CharNextA
GetMenuState
DeleteObject
GetDeviceCaps
SaveDC
RestoreDC
SelectObject
GetStockObject
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
GetObjectA
DeleteDC
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
SetBkColor
SetTextColor
GetClipBox
CreateBitmap
ClosePrinter
OpenPrinterA
DocumentPropertiesA
RegOpenKeyExA
RegQueryValueExA
ord17
Detect
DevSetup
Help
Install
Scan
Uninstall
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE