Bdg
Dkt
Ems
Iat
Nyn
Ocs
Rla
Tcl
Uby
Wmr
Static task
static1
Behavioral task
behavioral1
Sample
16206b225b337a72f2e55fbee00d2bb6_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
16206b225b337a72f2e55fbee00d2bb6_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
16206b225b337a72f2e55fbee00d2bb6_JaffaCakes118
Size
112KB
MD5
16206b225b337a72f2e55fbee00d2bb6
SHA1
288bad84d4d4504053b889797857206a2f090631
SHA256
743b1e89bcac389343bcd82f6c2a38e61838276653ad73e59b76138da57654bf
SHA512
fd13b770fe26af30776875c9c34ebf1e8183190237133dee2d8b4e5697228f142b87f0e94270e8a945be4265c68a559811d1f7f842017300db9e8612c7691da8
SSDEEP
3072:S1QtmSPBeoes8EuG3JH/JFQWIz0lKMMiU1m9:Smwa8dG5H3TKNP
Checks for missing Authenticode signature.
resource |
---|
16206b225b337a72f2e55fbee00d2bb6_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
VariantCopyInd
VariantClear
SysFreeString
SysAllocStringLen
LoadTypeLib
CloseServiceHandle
ControlService
StartServiceA
QueryServiceStatus
InitializeSecurityDescriptor
DeleteService
CreateServiceA
AdjustTokenPrivileges
WriteFmtUserTypeStg
ReleaseStgMedium
ProgIDFromCLSID
OleSetClipboard
OleLockRunning
OleInitialize
OleGetClipboard
CreateOleAdviseHolder
CoUninitialize
CoTaskMemFree
WriteClassStm
CoRegisterClassObject
CoInitialize
CoGetMalloc
CLSIDFromString
SetCursor
MessageBeep
LoadCursorA
IsCharUpperA
IsCharLowerA
EndDeferWindowPos
DrawTextA
DrawMenuBar
DestroyCursor
CreateDialogIndirectParamA
CreateDesktopW
CopyImage
CharLowerA
SHGetFileInfoA
SHFileOperationA
SHBindToParent
SHGetMalloc
SHAutoComplete
StrChrA
StrStrIA
PathFindFileNameA
PathFindExtensionA
PathFileExistsA
PathCompactPathExA
PathCanonicalizeA
PathAppendA
PathUnquoteSpacesA
PathMatchSpecA
PathIsRootA
PathIsRelativeA
PathIsDirectoryA
time
strcmp
memset
__dllonexit
memcpy
malloc
free
_errno
lstrcpynA
lstrlenA
lstrcmpA
lstrcatA
SetCurrentDirectoryA
LocalAlloc
LeaveCriticalSection
InitializeCriticalSection
GetVersion
GetStartupInfoA
GetFileSize
FreeResource
ExitThread
ExitProcess
lstrcpyA
Bdg
Dkt
Ems
Iat
Nyn
Ocs
Rla
Tcl
Uby
Wmr
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ