RZKInst
RZKRun
RZKShutdown
RZKStartup
RZKTest
Static task
static1
Behavioral task
behavioral1
Sample
ec1d7c5e391bc61358efdf9b22aefc25_JaffaCakes118.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ec1d7c5e391bc61358efdf9b22aefc25_JaffaCakes118.dll
Resource
win10v2004-20240226-en
Target
ec1d7c5e391bc61358efdf9b22aefc25_JaffaCakes118
Size
32KB
MD5
ec1d7c5e391bc61358efdf9b22aefc25
SHA1
f4a4f4cd730bb38a55e76ba1949329e1c7b26a5b
SHA256
35cdef685986975396958a936daca254941a10fb7b33d0d9ba0d6023c01535ed
SHA512
396034355009eea62e214d69e8a432cc4efea69cdaaf453428963c0907aaab1d6ac23f4bdf47c369e05dc98acb89fbf4e048cb77a94953c47523e1af4c6a40b0
SSDEEP
768:hJoX520i0HVUWcpfEH5T3zeW0G6eBrInN:hnKHV4RS5WWB6em
Checks for missing Authenticode signature.
resource |
---|
ec1d7c5e391bc61358efdf9b22aefc25_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
FindAtomA
GetModuleFileNameA
CreateMutexA
WriteFile
CloseHandle
GetVersion
GetTempPathA
Sleep
GetSystemTime
GetSystemDirectoryA
GetVersionExA
SystemTimeToFileTime
lstrcmpiA
GetProcAddress
SetEvent
lstrcpyA
VirtualAlloc
VirtualFree
GetWindowsDirectoryA
LoadLibraryA
WritePrivateProfileStringA
GetFileSize
MoveFileA
OpenProcess
GetVolumeInformationA
lstrcmpA
CreateEventA
GetTickCount
GetLocaleInfoA
MoveFileExA
FreeLibrary
GetCurrentThreadId
GetTempFileNameA
HeapAlloc
WriteProcessMemory
DeleteFileA
HeapFree
GetProcessHeap
ReadProcessMemory
ReadFile
VirtualProtectEx
VirtualQueryEx
GlobalAlloc
TerminateProcess
GlobalFree
ResumeThread
GetThreadContext
SetThreadContext
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
VirtualQuery
RtlUnwind
GetLocalTime
WaitForSingleObject
GetLastError
lstrcpynA
lstrlenA
CreateFileA
lstrcatA
CreateThread
GetModuleHandleA
CreateProcessA
IsDebuggerPresent
SetThreadDesktop
SetWindowsHookExA
GetWindowRect
GetCursorPos
FindWindowExA
GetFocus
CallNextHookEx
PostMessageA
wsprintfA
EqualRect
GetThreadDesktop
OpenInputDesktop
GetCaretPos
IsWindowVisible
FindWindowA
InflateRect
GetWindowThreadProcessId
ClientToScreen
CloseDesktop
RegOpenKeyExA
RegDeleteValueA
CreateProcessAsUserA
RegQueryValueExA
OpenProcessToken
RegEnumValueA
RegDeleteKeyA
RegEnumKeyExA
RegCloseKey
SHDeleteKeyA
SHDeleteValueA
SHSetValueA
SHGetValueA
RZKInst
RZKRun
RZKShutdown
RZKStartup
RZKTest
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ