s0WxBbiLTc@12
CHNMF@16
_lm2jegop
Static task
static1
Behavioral task
behavioral1
Sample
84df1ea9cb1fd2c1ef3e7f2e11f7db82_JaffaCakes118.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
84df1ea9cb1fd2c1ef3e7f2e11f7db82_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Target
84df1ea9cb1fd2c1ef3e7f2e11f7db82_JaffaCakes118
Size
216KB
MD5
84df1ea9cb1fd2c1ef3e7f2e11f7db82
SHA1
8f00465bf91eafd5d111f3121a57ed1b95f5d94f
SHA256
87e0a338b952aefeb411e37d5779aab9f79fc501b4aff949b083085ff7d27506
SHA512
9c86628e66f1e9a8cada54a2c9fb4f99dfd77037151314ea2e2e16d16e19c56bdd37920ba730a23d77ff33c31393e4a6902a9c667ca69e28142b62268e16bb38
SSDEEP
6144:tGHAQw6SGfO4pYtbDn1l9VyCkHC1DrrIZ:tgeRuO4p+bv3yCS0n
Checks for missing Authenticode signature.
Processes:
resource |
---|
84df1ea9cb1fd2c1ef3e7f2e11f7db82_JaffaCakes118 |
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
VariantCopyInd
SafeArrayGetElement
SysStringLen
VariantChangeType
SysReAllocStringLen
SysAllocStringLen
SysFreeString
SafeArrayUnaccessData
OleLoadPicture
DrawEdge
InsertMenuA
DrawTextA
EnableMenuItem
LoadCursorA
GetSysColor
CreatePopupMenu
InflateRect
CharLowerA
SetScrollInfo
OemToCharA
MapWindowPoints
GetClipboardData
GetMenuItemInfoA
BeginPaint
EnableWindow
GetKeyState
DeleteMenu
GetClassLongA
GetWindowThreadProcessId
SetTimer
SetScrollPos
CreateWindowExA
GetMenu
GetClassInfoA
SetWindowLongA
DrawFrameControl
WaitMessage
TrackPopupMenu
GetDC
GetKeyboardState
RegisterWindowMessageA
IsMenu
ClientToScreen
GetMenuItemID
DefWindowProcA
IsCharUpperA
UnregisterClassA
DefMDIChildProcA
DestroyWindow
GetWindow
CharNextW
RemovePropA
SetActiveWindow
IsWindow
TranslateMDISysAccel
OpenClipboard
GetMenuItemCount
SetWindowPlacement
OpenIcon
SystemParametersInfoA
EnumWindows
LoadKeyboardLayoutA
ShowWindow
SetScrollRange
GetCursorPos
GetWindowPlacement
FrameRect
RemoveMenu
DispatchMessageA
IsWindowUnicode
DestroyCursor
ShowScrollBar
ReleaseDC
GetFocus
LoadStringA
SetForegroundWindow
EqualRect
RedrawWindow
CharToOemA
GetKeyboardLayoutNameA
CreateIcon
KillTimer
SendMessageA
GetDlgItem
EndDialog
CheckMenuItem
SetWindowLongW
CloseClipboard
GetParent
IsChild
SetCursor
EnumChildWindows
SetMenuItemInfoA
DestroyMenu
GetWindowLongA
PostMessageA
RegisterClipboardFormatA
GetKeyNameTextA
GetKeyboardLayoutList
DestroyIcon
GetSubMenu
DrawIcon
GetWindowDC
SetWindowTextA
SendMessageW
GetMenuStringA
GetCapture
EnableScrollBar
ActivateKeyboardLayout
GetSysColorBrush
CharNextA
InvalidateRect
RegisterClassA
IsIconic
SetClipboardData
CallWindowProcA
GetClassNameA
DispatchMessageW
GetSystemMetrics
PeekMessageA
IsZoomed
UnhookWindowsHookEx
CharLowerBuffA
EnumThreadWindows
GetLastError
GetModuleHandleW
GetLocalTime
GetEnvironmentStrings
GlobalAlloc
GetCPInfo
LoadLibraryA
GetFileAttributesA
ResetEvent
lstrcmpA
DeleteCriticalSection
GetProcAddress
GetLocaleInfoA
VirtualAllocEx
GetDateFormatA
ExitProcess
GetDiskFreeSpaceA
CreateEventA
FormatMessageA
EnterCriticalSection
GetTempPathA
GetFullPathNameA
lstrlenA
GetFileType
IsBadReadPtr
RegEnumValueA
SHSetValueA
SHEnumValueA
SHGetValueA
PathFileExistsA
s0WxBbiLTc@12
CHNMF@16
_lm2jegop
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ