ZumyvvYVBYlw5O@4
9H9NhAmPAm
qssIvxmcgcXrN_
3sWY9WXfRUj7o
Z7givw_BTsNfdi@4
MlVftn@20
YgZRI59nuAyJ_@16
NEds8hbZ4@20
mCTkJey@24
ek9uxHpY4ncRwp@16
QuY4lEOjosJ9e@20
jmeUn5OY
Static task
static1
Behavioral task
behavioral1
Sample
1840957d54326afee65318bc67a82e13_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1840957d54326afee65318bc67a82e13_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
1840957d54326afee65318bc67a82e13_JaffaCakes118
Size
135KB
MD5
1840957d54326afee65318bc67a82e13
SHA1
02d109fb42afbfefdf8643c1bc7c21262c0a170b
SHA256
f9f22110a1f49df7339ce74f836c3ff3a96e1d4ec4de492130c9b8dbfcab53b3
SHA512
4740e75c9e49c6e3fb1cc584be830847219bafe72a277e48583401ddae6b2a94801aff723573f8e65306d3d01a27aac485a5cc1f11c368994979d931fb58653e
SSDEEP
1536:BXjUKjXhGm9itcP5fAa0Bc/XbLfWoVjKad4MHJnhPlJO8o7ovMVx8DX6kRlM6trw:BXhU6PWal194YnhP3WM2e6Zf6a7
Checks for missing Authenticode signature.
resource |
---|
1840957d54326afee65318bc67a82e13_JaffaCakes118 |
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
SetScrollRange
EqualRect
CloseClipboard
SetScrollPos
GetMenu
OemToCharA
EndDialog
DrawIcon
LoadStringA
DrawTextA
CreatePopupMenu
MapWindowPoints
wsprintfA
IsWindowVisible
SetForegroundWindow
GetScrollInfo
TrackPopupMenu
CallNextHookEx
GetActiveWindow
GetScrollRange
GetForegroundWindow
GetTopWindow
EnumThreadWindows
RegisterClipboardFormatA
InsertMenuA
IsWindowEnabled
CreateWindowExA
IsCharUpperA
IsWindow
GetWindowLongA
GetMenuItemID
RemoveMenu
IsChild
GetDCEx
GetSystemMetrics
DrawMenuBar
GetSubMenu
GetSystemMenu
UnregisterClassA
SetTimer
GetKeyboardState
GetWindowThreadProcessId
RedrawWindow
EnableScrollBar
GetSysColorBrush
GetKeyboardType
CheckMenuItem
SetFocus
GetDesktopWindow
GetKeyboardLayoutNameA
CharUpperA
CreateMenu
DrawAnimatedRects
DeleteMenu
GetWindowDC
EnableMenuItem
ActivateKeyboardLayout
IsDlgButtonChecked
CreateIcon
SetWindowLongW
SetCursor
GetWindow
LocalAlloc
MulDiv
ExitProcess
CloseHandle
VirtualAllocEx
GetCurrentThread
CreateThread
LocalReAlloc
lstrlenA
lstrcpynA
GetModuleHandleA
HeapAlloc
LoadLibraryA
GetModuleHandleW
FindClose
GetTickCount
GetCurrentProcess
GetUserDefaultLCID
HeapDestroy
MoveFileA
SetFilePointer
EnterCriticalSection
ImageList_Write
ImageList_DragShowNolock
ImageList_Destroy
ImageList_DrawEx
ImageList_Draw
ImageList_Remove
ZumyvvYVBYlw5O@4
9H9NhAmPAm
qssIvxmcgcXrN_
3sWY9WXfRUj7o
Z7givw_BTsNfdi@4
MlVftn@20
YgZRI59nuAyJ_@16
NEds8hbZ4@20
mCTkJey@24
ek9uxHpY4ncRwp@16
QuY4lEOjosJ9e@20
jmeUn5OY
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ