BHMInst
BHMRun
BHMShutdown
BHMStartup
BHMTest
Static task
static1
Behavioral task
behavioral1
Sample
fd00bc7a5129d550e86c2df63990865a_JaffaCakes118.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
fd00bc7a5129d550e86c2df63990865a_JaffaCakes118.dll
Resource
win10v2004-20240412-en
Target
fd00bc7a5129d550e86c2df63990865a_JaffaCakes118
Size
31KB
MD5
fd00bc7a5129d550e86c2df63990865a
SHA1
1bc867ae3207ea93a1e8f44db8b4e26404b750db
SHA256
ddb4389ee9df927baaa0cee895f697d7e6d5b0b46918812e1b6b2910dc5824a2
SHA512
cd7436b941d8827053fd6b8f1cf821e44a89bb3ec08deb10bfc495d1035682e92c176784d8cecf026478f203eb59ec5bb4559d25a1d8d9e67632943ba7827b5c
SSDEEP
384:AzwkOi70shEI+ezNvMUJQ9B4+Q3fLuXA3Uryp/ctxSRVRh8JkwV+CB6lZLhjPaNq:IzNBuEX/aWt8J1rFiBiNRfwwmrz
Checks for missing Authenticode signature.
resource |
---|
fd00bc7a5129d550e86c2df63990865a_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
FindAtomA
GetTickCount
GetModuleFileNameA
CreateMutexA
CloseHandle
WriteFile
GetVersion
GetTempPathA
GetSystemTime
SystemTimeToFileTime
GetSystemDirectoryA
GetCurrentThreadId
GetVersionExA
SetEvent
lstrcmpiA
GetProcAddress
VirtualAlloc
VirtualFree
lstrcpyA
CopyFileA
GetWindowsDirectoryA
GetFileSize
LoadLibraryA
OpenProcess
GetVolumeInformationA
WritePrivateProfileStringA
lstrcmpA
GetLocalTime
GetLocaleInfoA
CreateEventA
MoveFileExA
FreeLibrary
GetModuleHandleA
WriteProcessMemory
DeleteFileA
HeapAlloc
HeapFree
GetProcessHeap
ReadProcessMemory
ReadFile
VirtualProtectEx
GetTempFileNameA
SetThreadContext
VirtualQueryEx
GlobalAlloc
TerminateProcess
GlobalFree
ResumeThread
GetThreadContext
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
VirtualQuery
RtlUnwind
WaitForSingleObject
GetLastError
lstrcpynA
lstrlenA
lstrcatA
CreateFileA
CreateProcessA
CreateThread
MoveFileA
Sleep
IsDebuggerPresent
SetWindowsHookExA
GetWindowRect
GetCursorPos
FindWindowExA
GetFocus
PostMessageA
CallNextHookEx
EqualRect
wsprintfA
GetThreadDesktop
OpenInputDesktop
CloseDesktop
GetCaretPos
ClientToScreen
GetWindowThreadProcessId
IsWindowVisible
FindWindowA
InflateRect
SetThreadDesktop
RegOpenKeyExA
CreateProcessAsUserA
RegDeleteValueA
RegQueryValueExA
OpenProcessToken
RegDeleteKeyA
RegEnumValueA
RegEnumKeyExA
RegCloseKey
SHDeleteKeyA
SHDeleteValueA
SHSetValueA
SHGetValueA
GetAdaptersInfo
BHMInst
BHMRun
BHMShutdown
BHMStartup
BHMTest
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ