oILInst
oILRun
oILShutdown
oILStartup
oILTest
Static task
static1
Behavioral task
behavioral1
Sample
ea8f910e4911426c2ca26ccfa2ffc491_JaffaCakes118.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ea8f910e4911426c2ca26ccfa2ffc491_JaffaCakes118.dll
Resource
win10v2004-20240226-en
Target
ea8f910e4911426c2ca26ccfa2ffc491_JaffaCakes118
Size
30KB
MD5
ea8f910e4911426c2ca26ccfa2ffc491
SHA1
1f4708eac1ecaa173f4963fc0d5bfa4088fdf8a2
SHA256
426a78e936d42292d050b230a12a7a7b4e8fed1dd467777355c7547afdf98966
SHA512
ec5bb19661fe3b15ce0239c61df4d77923ad819a73f78508bb580a18718cc50cf49bbb770507a429bc10890d94dccb234700068e40f83f467ffaaaaf08d90a52
SSDEEP
384:31akO/YB1nR7UKY0qtkld4ZAWM/4VXGNu1pYrbFyuuS04psd4J/wVuENKlZPjpak:lakOj0qWUVz1FWI4JaZZnnBqNY4fw9
Checks for missing Authenticode signature.
resource |
---|
ea8f910e4911426c2ca26ccfa2ffc491_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetTickCount
FindAtomA
GetModuleFileNameA
CreateMutexA
WriteFile
CloseHandle
GetVersion
GetTempPathA
GetSystemTime
SystemTimeToFileTime
GetSystemDirectoryA
GetCurrentThreadId
GetVersionExA
SetEvent
lstrcmpiA
GetProcAddress
VirtualAlloc
VirtualFree
lstrcpyA
CopyFileA
GetWindowsDirectoryA
GetFileSize
LoadLibraryA
OpenProcess
GetVolumeInformationA
WritePrivateProfileStringA
lstrcmpA
GetLocalTime
GetLocaleInfoA
CreateEventA
MoveFileExA
FreeLibrary
GetModuleHandleA
WriteProcessMemory
DeleteFileA
HeapAlloc
HeapFree
GetProcessHeap
ReadProcessMemory
ReadFile
VirtualProtectEx
GetTempFileNameA
SetThreadContext
VirtualQueryEx
GlobalAlloc
TerminateProcess
GlobalFree
ResumeThread
GetThreadContext
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
VirtualQuery
RtlUnwind
WaitForSingleObject
GetLastError
lstrcpynA
lstrlenA
CreateFileA
lstrcatA
CreateProcessA
CreateThread
MoveFileA
Sleep
IsDebuggerPresent
SetWindowsHookExA
GetWindowRect
GetCursorPos
FindWindowExA
GetFocus
PostMessageA
CallNextHookEx
EqualRect
wsprintfA
GetThreadDesktop
OpenInputDesktop
CloseDesktop
GetCaretPos
ClientToScreen
GetWindowThreadProcessId
IsWindowVisible
FindWindowA
InflateRect
SetThreadDesktop
RegOpenKeyExA
CreateProcessAsUserA
RegDeleteValueA
RegQueryValueExA
OpenProcessToken
RegDeleteKeyA
RegEnumValueA
RegEnumKeyExA
RegCloseKey
SHDeleteKeyA
SHDeleteValueA
SHSetValueA
SHGetValueA
GetAdaptersInfo
oILInst
oILRun
oILShutdown
oILStartup
oILTest
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ