Qy001DoMainWSSK
222222222222
ServiceMain
Static task
static1
Behavioral task
behavioral1
Sample
014f9f84f72c5457f2f9510c6e7331e8_JaffaCakes118.dll
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
014f9f84f72c5457f2f9510c6e7331e8_JaffaCakes118.dll
Resource
win10v2004-20240611-en
Target
014f9f84f72c5457f2f9510c6e7331e8_JaffaCakes118
Size
41KB
MD5
014f9f84f72c5457f2f9510c6e7331e8
SHA1
f4cb3c52ffd1957655897b570af463c8b3700386
SHA256
c29f7be1aabdc2df8659fbdc31b4a350766a21e1a2bad859a3e161f845c45714
SHA512
5dbd33a20dbbba7bcf026527b129dcc59571348b702bd476c9dcbe6bfe72a77888aab5dfbe39d0c375a366fb711725f27d678d9476280b930505f102f6cb5983
SSDEEP
768:79ASu+fPFFR+twkG2Ht7ZaWmldBbOMHnuqEXBcV5t6eDYYPdMHg8:6B+fPrQwp6tXUdBqMHnGuXt6epdMHg8
Checks for missing Authenticode signature.
resource |
---|
014f9f84f72c5457f2f9510c6e7331e8_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetModuleHandleA
GetProcAddress
VirtualAlloc
VirtualFree
VirtualProtect
GetModuleFileNameExA
RegCloseKey
listen
ImmGetContext
StrChrA
capCreateCaptureWindowA
BitBlt
IsWindow
waveInStop
free
CreateStreamOnHGlobal
ShellExecuteA
Qy001DoMainWSSK
222222222222
ServiceMain
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE