Btgobb
Cthzj
Imicimvvme
Nmyc
Static task
static1
Behavioral task
behavioral1
Sample
155c3a1fa6b693c03f3f181fe8665f4a_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
155c3a1fa6b693c03f3f181fe8665f4a_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
155c3a1fa6b693c03f3f181fe8665f4a_JaffaCakes118
Size
140KB
MD5
155c3a1fa6b693c03f3f181fe8665f4a
SHA1
7ed975c0cdcbd012d4e5ed1634467822b44cd93a
SHA256
df9f61076a5978d1364c137cd75fc8bb205992a0366e243a4e7857afea28bd53
SHA512
cc83403e3a1d160d25c5a124c61ba09166a949a4f3db7ab6b4046e1df99ce15014f798d16e67e68ccef747f8ce0087ed1fd7383410d7781315476e101575d9ba
SSDEEP
3072:QOHuMd2zoHIUjUPe5WQG+VSVp3WhUxCt01FvL8EXk80nNEk:j9ozNPewdGS24j8tTNE
Checks for missing Authenticode signature.
resource |
---|
155c3a1fa6b693c03f3f181fe8665f4a_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
CloseHandle
EnumResourceNamesA
ExitProcess
FreeResource
GetACP
GetCommandLineA
GetModuleHandleA
GetOEMCP
GetStartupInfoA
LocalAlloc
RtlUnwind
SetUnhandledExceptionFilter
SleepEx
TlsFree
TlsGetValue
TlsSetValue
WriteFile
lstrcpyA
lstrcpynA
lstrlenA
ToAscii
LoadImageA
IsCharUpperA
IsCharLowerA
EndPaint
EndDialog
EnableScrollBar
EmptyClipboard
DrawIcon
DrawCaption
DestroyMenu
CreateDesktopA
LsaEnumerateAccountRights
LsaGetUserName
LsaICLookupNames
LsaLookupNames
LsaLookupPrivilegeDisplayName
RegEnumKeyA
LsaCreateTrustedDomain
LsaCreateSecret
LsaCreateAccount
LsaDeleteTrustedDomain
__vbaCyForInit
__vbaCyAdd
__vbaCheckType
__vbaForEachAry
__vbaError
__vbaErase
__vbaDateVar
__vbaCySgn
__vbaCyMulI2
__vbaCyMul
__vbaCyI4
__vbaBoolStr
__vbaAryRebase1Var
__vbaAryLock
__vbaAryCopy
__vbaCyForNext
DirectInputCreateEx
DirectInputCreateW
DirectInputCreateA
Btgobb
Cthzj
Imicimvvme
Nmyc
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ