WlLogon
WlStartup
Static task
static1
Behavioral task
behavioral1
Sample
edf7f210ebff37c42fe659905181e31e_JaffaCakes118.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
edf7f210ebff37c42fe659905181e31e_JaffaCakes118.dll
Resource
win10v2004-20240226-en
Target
edf7f210ebff37c42fe659905181e31e_JaffaCakes118
Size
56KB
MD5
edf7f210ebff37c42fe659905181e31e
SHA1
68918c36deea9ab210148669589d88a41111bd8d
SHA256
8e30a7bb9602adb4dad500dfc8d7c05f508caaa157b8fd2f0f38038dcafc9cc3
SHA512
e35b6e79ca6490708cc745c8c6c7a71f0f561cd7a79d6c2593df7ca70a2baf722146336bd901f3c4538b1f26d998c6f1b67b26f721902574d2ed483eeca4472b
SSDEEP
768:pcFvplZ/ija+1I2xSsxFw0aPZrtb0o1IqLX9w2SclUfLwH9DLSdPYtUrro4t4ppR:eFvpOSmsttb0on6hclUTFlaUI4k3
Checks for missing Authenticode signature.
resource |
---|
edf7f210ebff37c42fe659905181e31e_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
SysFreeString
SysAllocStringLen
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
RegQueryValueExA
RegQueryInfoKeyA
RegOpenKeyExA
RegCloseKey
GetKeyboardType
DestroyWindow
LoadStringA
MessageBoxA
CharNextA
MessageBoxA
LoadStringA
GetSystemMetrics
CharNextA
CharToOemA
GetACP
Sleep
VirtualFree
VirtualAlloc
GetCurrentThreadId
VirtualQuery
WideCharToMultiByte
MultiByteToWideChar
lstrlenA
lstrcpynA
LoadLibraryExA
GetThreadLocale
GetStartupInfoA
GetProcAddress
GetModuleHandleA
GetModuleFileNameA
GetLocaleInfoA
GetCommandLineA
FreeLibrary
FindFirstFileA
FindClose
ExitProcess
WriteFile
UnhandledExceptionFilter
RtlUnwind
RaiseException
GetStdHandle
TlsSetValue
TlsGetValue
TlsFree
TlsAlloc
LocalFree
LocalAlloc
WriteFile
VirtualQuery
MoveFileA
GetWindowsDirectoryA
GetVersionExA
GetThreadLocale
GetStdHandle
GetProcAddress
GetModuleHandleA
GetModuleFileNameA
GetLocaleInfoA
GetLocalTime
GetFileAttributesA
GetDiskFreeSpaceA
GetDateFormatA
GetCPInfo
FreeLibrary
EnumCalendarInfoA
DisableThreadLibraryCalls
DeleteFileA
WlLogon
WlStartup
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ