Ft
Hto
Tevkno
Static task
static1
Behavioral task
behavioral1
Sample
0cb58018b0a6d5d6d76bd3cb8f332f00_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0cb58018b0a6d5d6d76bd3cb8f332f00_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
0cb58018b0a6d5d6d76bd3cb8f332f00_JaffaCakes118
Size
116KB
MD5
0cb58018b0a6d5d6d76bd3cb8f332f00
SHA1
ffa6ad05954e34828a80ef2fd6717c54f5554550
SHA256
db2d376df459cb23e56f21c67533c9daa7c962eeb418db949bff74ae6fdbc7ed
SHA512
6003c0d1e27e477dd52e4f438a1410c26c88d73cb67576280cca99463c7a02e93a17d8c8482c4f18035bb258bff45a522e4381a93da0ac8d2bb74ac271bda451
SSDEEP
3072:Q2VsnVLglC2cfdcsQGUVMg69WBDa0NC0:Qo8LXEYg698
Checks for missing Authenticode signature.
resource |
---|
0cb58018b0a6d5d6d76bd3cb8f332f00_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
CloseHandle
CompareStringA
ExitProcess
GetACP
GetCommandLineA
GetModuleHandleA
GetOEMCP
GetPrivateProfileStringA
GetStartupInfoA
GetSystemTime
HeapAlloc
RtlUnwind
SetEndOfFile
SetLastError
SetUnhandledExceptionFilter
TlsFree
UnmapViewOfFile
VirtualFree
lstrcatA
lstrcpyA
ToAscii
ShowOwnedPopups
OemToCharBuffA
LoadAcceleratorsW
GetFocus
EndDeferWindowPos
EnableWindow
DestroyIcon
CharPrevA
GetWindowTextA
LsaEnumerateTrustedDomains
LsaGetQuotasForAccount
LsaGetRemoteUserName
LsaLookupNames
LsaLookupPrivilegeDisplayName
__vbaCyStr
__vbaCyInt
__vbaCyAbs
__vbaExitEachVar
__vbaAryConstruct2
__vbaExitEachColl
__vbaExitEachAry
__vbaEraseKeepData
__vbaDateVar
__vbaCyVar
DirectInputCreateA
DirectInputCreateEx
DirectInputCreateW
Ft
Hto
Tevkno
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ