2E3zPJlo
58StZAHyo_Va
Static task
static1
Behavioral task
behavioral1
Sample
264fa0626e7c70b90f3bfb7918d21789_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
264fa0626e7c70b90f3bfb7918d21789_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Target
264fa0626e7c70b90f3bfb7918d21789_JaffaCakes118
Size
220KB
MD5
264fa0626e7c70b90f3bfb7918d21789
SHA1
c3a5439149091cd0a3c62d554762251655ac9c4f
SHA256
f5a119e955a9d4e3fecc0b3158b57f01c37302413df7cd9d648b91a3edab1ce7
SHA512
efbfaf7b0eae74e7b3fccbda17ede9475e0a31d2ba1e345e7ecb2c764d998d625162d3d558250a60c40e33127a0e774f7874fab0baad0016f1a64b01f70a5d27
SSDEEP
3072:f5XScTP7DtVsdoovYtDxlQX2dk5TZcpEg3FD4kesjK/fDphrR:ZScTtWgtDxlgypj1MBfD
Checks for missing Authenticode signature.
resource |
---|
264fa0626e7c70b90f3bfb7918d21789_JaffaCakes118 |
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetKeyboardLayoutList
PeekMessageA
CharNextW
SetScrollInfo
RegisterWindowMessageA
SetWindowsHookExA
DestroyIcon
EnableWindow
CharUpperA
FindWindowA
ShowOwnedPopups
EnableMenuItem
SetRect
OpenIcon
AdjustWindowRectEx
DefMDIChildProcA
WindowFromPoint
EndDialog
OemToCharA
DefWindowProcA
GetWindowTextLengthA
DispatchMessageA
GetActiveWindow
EqualRect
SystemParametersInfoA
IsCharLowerA
CallWindowProcA
LoadCursorA
PtInRect
IsDialogMessageW
GetSubMenu
SetClassLongA
GetDlgItem
SetWindowLongW
GetSysColor
CharLowerBuffA
GetClipboardData
GetMessagePos
LoadStringA
SetCursor
GetCapture
CharNextA
OpenClipboard
wsprintfA
GetKeyNameTextA
LoadBitmapA
GetClassLongA
GetKeyboardState
CharLowerA
GetMenuItemInfoA
OffsetRect
GetMenuItemCount
GetMenu
CloseClipboard
ActivateKeyboardLayout
CallNextHookEx
PeekMessageW
GetWindowTextA
EndPaint
PostQuitMessage
GetSystemMenu
GetCursor
GetFileVersionInfoA
LoadLibraryA
GlobalDeleteAtom
GetDateFormatA
SetEndOfFile
GetSystemDefaultLangID
GetUserDefaultLCID
GetLocalTime
GetThreadLocale
IsBadHugeReadPtr
RaiseException
GetCPInfo
SetEvent
ExitProcess
DeleteFileA
ReadFile
GetOEMCP
LoadResource
GetModuleFileNameA
LocalReAlloc
VirtualAllocEx
HeapDestroy
GetCurrentProcess
GetBkColor
2E3zPJlo
58StZAHyo_Va
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ