_MainWndProc@16
_StubFileWrite@12
Static task
static1
Behavioral task
behavioral1
Sample
2ea8e0a893b87ac33daf5cc6420acffb_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2ea8e0a893b87ac33daf5cc6420acffb_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Target
2ea8e0a893b87ac33daf5cc6420acffb_JaffaCakes118
Size
161KB
MD5
2ea8e0a893b87ac33daf5cc6420acffb
SHA1
251470975c006ade1281a75a067ad2fd790f7c1a
SHA256
b827b17bb6fbc01e142ed41ee7c8c12373ed3719c95abbe1b7ff90246d2187a5
SHA512
2fcafc6fdbfeaec04cf1033342b67f987bba3fb6e88743cf38b40c131e2d6c8274836fc56a84a9b26606b8654ef72e6a1e0b8b2f64cdd5c159398c8745d9380c
SSDEEP
3072:Xj4uE6ybPIozpJn4g1sl7GMJIIyNPQHkn+wmq/HU7:XNE6QhJJ1slaMJIIyNPQH+/07
Checks for missing Authenticode signature.
resource |
---|
2ea8e0a893b87ac33daf5cc6420acffb_JaffaCakes118 |
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
SetErrorMode
lstrcatA
GetDriveTypeA
SetEnvironmentVariableA
lstrcpyA
GetModuleFileNameA
GetTempPathA
GetTempFileNameA
GlobalHandle
_lwrite
_lcreat
_lopen
_lclose
WinExec
GetEnvironmentVariableA
RemoveDirectoryA
CreateDirectoryA
GetWindowsDirectoryA
GetProcessHeap
ExitProcess
TerminateProcess
SetStdHandle
SetFilePointer
FlushFileBuffers
GetStringTypeA
WriteFile
GetStringTypeW
GetFileType
GetStdHandle
RtlUnwind
GetEnvironmentStringsW
GetEnvironmentStrings
SetHandleCount
GlobalLock
GetCurrentProcess
FreeEnvironmentStringsA
UnhandledExceptionFilter
FreeEnvironmentStringsW
LCMapStringA
MultiByteToWideChar
LCMapStringW
GetVersionExA
HeapAlloc
GetCurrentThread
CloseHandle
HeapFree
LoadLibraryA
GetProcAddress
GetCurrentThreadId
FreeLibrary
_lread
_llseek
GlobalUnlock
GlobalFree
GlobalAlloc
HeapDestroy
HeapCreate
GetOEMCP
GetLastError
DeleteFileA
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
GetACP
WideCharToMultiByte
VirtualFree
VirtualAlloc
HeapReAlloc
GetCPInfo
ReleaseDC
ExitWindowsEx
MessageBoxA
LoadIconA
RegisterClassA
LoadCursorA
SetWindowPos
UpdateWindow
ShowWindow
wsprintfA
LoadStringA
InvalidateRect
BeginPaint
EndPaint
DefWindowProcA
PostQuitMessage
SendMessageA
GetDC
GetClientRect
CreateWindowExA
GetDeviceCaps
GetStockObject
PatBlt
DeleteObject
SelectObject
RealizePalette
CreateSolidBrush
CreatePalette
SelectPalette
SetSecurityDescriptorDacl
AllocateAndInitializeSid
GetLengthSid
InitializeAcl
AddAccessAllowedAce
InitializeSecurityDescriptor
RevertToSelf
SetSecurityDescriptorOwner
SetSecurityDescriptorGroup
ImpersonateSelf
OpenThreadToken
MapGenericMask
AccessCheck
_MainWndProc@16
_StubFileWrite@12
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE