Ft
Hto
Tevkno
Static task
static1
Behavioral task
behavioral1
Sample
2ec0b41fd127fc7b80757e1372fa851f_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2ec0b41fd127fc7b80757e1372fa851f_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Target
2ec0b41fd127fc7b80757e1372fa851f_JaffaCakes118
Size
119KB
MD5
2ec0b41fd127fc7b80757e1372fa851f
SHA1
e9cf4f446fb9f4527b3e97175eb8c40d0f706af4
SHA256
ef3fd96b0a5c386c5f5c5ec8eae3daf9a4742ace93e377bef630175879faa261
SHA512
108a84fcf5138b33f5413f28c85f491f2d71563f932dcff676d05dffffe30be89d1c1bbeccec005f57d0ec7204dba8e65a560734da01aab5a517799da8ed3746
SSDEEP
3072:KxERpAyFgMn5OlYEg1Qq6y3WyORCiprSYvKS7ONjY8AAtJjI:KiOyFF5ONkCyfipBiNnxtJj
Checks for missing Authenticode signature.
resource |
---|
2ec0b41fd127fc7b80757e1372fa851f_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
CloseHandle
CompareStringA
ExitProcess
GetACP
GetCommandLineA
GetModuleHandleA
GetOEMCP
GetPrivateProfileStringA
GetStartupInfoA
GetSystemTime
HeapAlloc
RtlUnwind
SetEndOfFile
SetLastError
SetUnhandledExceptionFilter
TlsFree
UnmapViewOfFile
VirtualFree
lstrcatA
lstrcpyA
ToAscii
ShowOwnedPopups
OemToCharBuffA
LoadAcceleratorsW
GetFocus
EndDeferWindowPos
EnableWindow
DestroyIcon
CharPrevA
GetWindowTextA
LsaEnumerateTrustedDomains
LsaGetQuotasForAccount
LsaGetRemoteUserName
LsaLookupNames
LsaLookupPrivilegeDisplayName
__vbaCyStr
__vbaCyInt
__vbaCyAbs
__vbaExitEachVar
__vbaAryConstruct2
__vbaExitEachColl
__vbaExitEachAry
__vbaEraseKeepData
__vbaDateVar
__vbaCyVar
DirectInputCreateA
DirectInputCreateEx
DirectInputCreateW
Ft
Hto
Tevkno
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ