TMethodImplementationIntercept
__dbk_fcall_wrapper
dbkFCallWrapperAddr
Static task
static1
Behavioral task
behavioral1
Sample
120771119f196f36035366ffe7f618a4_JaffaCakes118.exe
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
120771119f196f36035366ffe7f618a4_JaffaCakes118.exe
Resource
win10v2004-20240226-en
Target
120771119f196f36035366ffe7f618a4_JaffaCakes118
Size
6.2MB
MD5
120771119f196f36035366ffe7f618a4
SHA1
a35352df24ee96141da6cb919d5a89b35331b15c
SHA256
2876d42c46641da695dc251590c52f78e373dfea91931c2f151df460084624ac
SHA512
449ee7e279deccb2db8ac916fc8ffd93fda4929204d6d6ec60e31adfe6f6d921c35239e6d01dc6ea560a5f59153c7090334f454c54a17f2751d0ac09e415b43b
SSDEEP
98304:ThBe9Z1pqoaADoAuEgQdcpUgUOgZzz5Z2HSyOpJTqXOPqPRxDmgxn+4T7N+X/U:TWVZoAujQOpUgUBUDOT+OP+Tx+4TG/U
Checks for missing Authenticode signature.
resource |
---|
120771119f196f36035366ffe7f618a4_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
SetFileAttributesW
GetFileType
SetFileTime
QueryDosDeviceW
GetACP
GetExitCodeProcess
CloseHandle
LocalFree
SizeofResource
VirtualProtect
UpdateResourceW
QueryPerformanceFrequency
IsDebuggerPresent
FindNextFileW
GetFullPathNameW
VirtualFree
HeapAlloc
ExitProcess
GetCPInfoExW
RtlUnwind
GetCPInfo
EnumSystemLocalesW
GetStdHandle
GetTimeZoneInformation
FileTimeToLocalFileTime
SystemTimeToTzSpecificLocalTime
GetModuleHandleW
FreeLibrary
TryEnterCriticalSection
SetDllDirectoryW
HeapDestroy
FileTimeToDosDateTime
ReadFile
CreateProcessW
HeapSize
GetLastError
GetModuleFileNameW
SetLastError
FindResourceW
CreateThread
CompareStringW
CopyFileW
MapViewOfFile
CreateMutexW
LoadLibraryA
GetVolumeInformationW
ResetEvent
FreeResource
GetDriveTypeW
GetVersion
RaiseException
MoveFileW
FormatMessageW
SwitchToThread
GetExitCodeThread
GetCurrentThread
GetLogicalDrives
GetFileAttributesExW
LoadLibraryExW
TerminateProcess
LockResource
BeginUpdateResourceW
FileTimeToSystemTime
GetCurrentThreadId
UnhandledExceptionFilter
PeekNamedPipe
VirtualQuery
VirtualQueryEx
Sleep
EnterCriticalSection
SetFilePointer
LoadResource
SuspendThread
GetTickCount
WritePrivateProfileStringW
GetFileSize
GetStartupInfoW
GetFileAttributesW
GetCurrentDirectoryW
SetCurrentDirectoryW
InitializeCriticalSection
GetThreadPriority
GetCurrentProcess
SetThreadPriority
VirtualAlloc
GetTempPathW
GetCommandLineW
GetSystemInfo
DuplicateHandle
LeaveCriticalSection
GetProcAddress
ResumeThread
GetLogicalDriveStringsW
GetVersionExW
VerifyVersionInfoW
HeapCreate
GetDiskFreeSpaceW
VerSetConditionMask
FindFirstFileW
GetUserDefaultUILanguage
GetConsoleOutputCP
UnmapViewOfFile
GetConsoleCP
lstrlenW
SetEndOfFile
QueryPerformanceCounter
HeapFree
WideCharToMultiByte
FindClose
MultiByteToWideChar
LoadLibraryW
SetEvent
GetLocaleInfoW
CreateFileW
SystemTimeToFileTime
DeleteFileW
IsDBCSLeadByteEx
GetEnvironmentVariableW
GetLocalTime
WaitForSingleObject
WriteFile
CreateFileMappingW
ExitThread
CreatePipe
DeleteCriticalSection
GetDateFormatW
TlsGetValue
SetErrorMode
GetComputerNameW
TzSpecificLocalTimeToSystemTime
IsValidLocale
TlsSetValue
EndUpdateResourceW
CreateDirectoryW
GetSystemDefaultUILanguage
EnumCalendarInfoW
LocalAlloc
RemoveDirectoryW
CreateEventW
GetPrivateProfileStringW
GetThreadLocale
SetThreadLocale
inet_addr
IsUserAnAdmin
SHFileOperationW
ShellExecuteW
ShellExecuteExW
CoInitialize
CoCreateInstance
CoUninitialize
CoTaskMemFree
StringFromCLSID
GetFileVersionInfoSizeW
VerQueryValueW
GetFileVersionInfoW
SendMessageW
LockWorkStation
CharLowerBuffW
CharUpperW
PeekMessageW
GetSystemMetrics
PostMessageW
MessageBoxW
GetForegroundWindow
CharUpperBuffW
CharNextW
MsgWaitForMultipleObjects
LoadStringW
ExitWindowsEx
mouse_event
FindWindowW
SendARP
SetErrorInfo
GetErrorInfo
SysFreeString
VariantClear
VariantInit
SysReAllocStringLen
SafeArrayCreate
CreateErrorInfo
SysAllocStringLen
SafeArrayPtrOfIndex
SafeArrayGetUBound
SafeArrayGetLBound
VariantCopy
VariantChangeType
VariantCopyInd
memcpy
memset
NetWkstaGetInfo
NetApiBufferFree
RegSetValueExW
RegConnectRegistryW
RegEnumKeyExW
RegLoadKeyW
AdjustTokenPrivileges
RegDeleteKeyW
LookupPrivilegeValueW
OpenProcessToken
RegOpenKeyExW
RegQueryInfoKeyW
CryptGenRandom
RegUnLoadKeyW
CryptReleaseContext
RegSaveKeyW
RegDeleteValueW
RegReplaceKeyW
RegFlushKey
RegQueryValueExW
RegEnumValueW
RegCloseKey
RegCreateKeyExW
CryptAcquireContextW
RegRestoreKeyW
TMethodImplementationIntercept
__dbk_fcall_wrapper
dbkFCallWrapperAddr
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ