Always
CopyMedAdFromSys32
CreateADContent
ReRunMidIE
SetMediasFileTimeTag
SetNewVersionTag
StarShowAD
playAdh
Static task
static1
Behavioral task
behavioral1
Sample
0345fdb1b83e773e77a1a213e061c872_JaffaCakes118.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0345fdb1b83e773e77a1a213e061c872_JaffaCakes118.dll
Resource
win10v2004-20240611-en
Target
0345fdb1b83e773e77a1a213e061c872_JaffaCakes118
Size
532KB
MD5
0345fdb1b83e773e77a1a213e061c872
SHA1
27a00218af143d00fe561bbf1bae7620f09e9257
SHA256
902e8dd4a33530d0186ffa4bc257eba924ed61530af0ea921741eaf6b2d2ce82
SHA512
52c3cdf77573340c0e59fca4c3fb4f97ac3722804c13508d5c0935936ee689ff0c1b21bbe3df43c10742b5c1613ededc3ca02301254ae9f41b59930d7ae2d389
SSDEEP
12288:qPbMuWv4L1QYpiYsZ7Xa3kD9wFZJp1ePCsfCDJAhDCa2IyJsz0imG8cN0T:qznJiY6j4kC7JpPDJAhDCHmoG8BT
Checks for missing Authenticode signature.
resource |
---|
0345fdb1b83e773e77a1a213e061c872_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
gethostbyname
WSACleanup
WSAStartup
CoTaskMemFree
CoInitialize
CoUninitialize
CoCreateInstance
CLSIDFromString
CLSIDFromProgID
CoGetClassObject
OleLockRunning
CoTaskMemAlloc
StringFromGUID2
OleUninitialize
OleInitialize
CreateStreamOnHGlobal
CoTaskMemRealloc
InternetOpenA
GetUrlCacheEntryInfoA
InternetCrackUrlA
InternetConnectA
HttpOpenRequestA
HttpSendRequestA
DeleteUrlCacheEntry
InternetOpenUrlA
InternetCloseHandle
InternetReadFile
FindFirstUrlCacheEntryA
FindNextUrlCacheEntryA
URLDownloadToFileA
InitializeCriticalSection
DeleteCriticalSection
GetLocalTime
CloseHandle
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
OpenFileMappingA
ReleaseMutex
FlushViewOfFile
WaitForSingleObject
CreateMutexA
FindClose
FindFirstFileA
SetFileAttributesA
GetLastError
GetTempFileNameA
GetTempPathA
CreateProcessA
WriteFile
SetFilePointer
GetFileSize
GetTickCount
CreateFileA
Sleep
DeleteFileA
lstrcmpA
FindNextFileA
lstrcatA
lstrcpyA
CreateDirectoryA
GetVersionExA
SetProcessWorkingSetSize
GetCurrentProcess
CreateThread
GetSystemTimeAsFileTime
SetErrorMode
InterlockedExchange
GetACP
GetLocaleInfoA
GetThreadLocale
MultiByteToWideChar
EnterCriticalSection
LeaveCriticalSection
FlushInstructionCache
HeapFree
GetProcessHeap
HeapAlloc
WideCharToMultiByte
InterlockedDecrement
lstrlenA
GetCurrentThreadId
GlobalUnlock
GlobalLock
GlobalAlloc
lstrlenW
MulDiv
InterlockedIncrement
GetModuleFileNameA
CopyFileA
GetShortPathNameA
GetLogicalDrives
GetCurrentDirectoryA
RaiseException
GetModuleHandleA
FreeLibrary
SizeofResource
LoadResource
FindResourceA
LoadLibraryExA
lstrcmpiA
lstrcpynA
IsDBCSLeadByte
GetWindowsDirectoryA
GetProcAddress
LoadLibraryA
GetVolumeInformationA
GetPrivateProfileSectionA
SetEndOfFile
SetEvent
OpenEventA
WaitForMultipleObjects
CreateEventA
Module32Next
Module32First
CreateToolhelp32Snapshot
Process32Next
Process32First
ReadFile
TerminateProcess
DeviceIoControl
GetFileAttributesA
VirtualAlloc
VirtualFree
GetStdHandle
QueryPerformanceCounter
IsBadWritePtr
GetCurrentProcessId
HeapCreate
HeapDestroy
TlsGetValue
TlsSetValue
TlsFree
SetLastError
TlsAlloc
GetOEMCP
GetCPInfo
LCMapStringW
LCMapStringA
RemoveDirectoryA
GetCommandLineA
HeapReAlloc
VirtualQuery
GetSystemInfo
VirtualProtect
FileTimeToLocalFileTime
FileTimeToSystemTime
ExitProcess
RtlUnwind
HeapSize
GetFullPathNameA
FlushFileBuffers
SetHandleCount
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
UnhandledExceptionFilter
GetTimeZoneInformation
GetStringTypeA
GetStringTypeW
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
IsValidCodePage
IsBadReadPtr
IsBadCodePtr
SetStdHandle
GetLocaleInfoW
CompareStringA
CompareStringW
SetEnvironmentVariableA
LocalFree
GetDriveTypeA
SetUnhandledExceptionFilter
GetForegroundWindow
SystemParametersInfoA
MapWindowPoints
ShowWindow
UpdateWindow
PeekMessageA
GetMessageA
TranslateMessage
DispatchMessageA
FindWindowExA
PostMessageA
CreateAcceleratorTableA
CharNextA
GetParent
GetClassNameA
RedrawWindow
GetDlgItem
IsWindow
DestroyAcceleratorTable
GetFocus
IsChild
GetWindow
SetFocus
AdjustWindowRectEx
BeginPaint
EndPaint
GetDesktopWindow
InvalidateRgn
InvalidateRect
FillRect
SetCapture
ReleaseCapture
GetSysColor
CreateWindowExA
CallWindowProcA
RegisterWindowMessageA
RegisterClassExA
GetWindowTextLengthA
GetWindowTextA
DefWindowProcA
SetActiveWindow
LoadCursorA
GetClassInfoExA
KillTimer
SetTimer
SetWindowPos
MoveWindow
SetWindowTextA
SendMessageA
GetWindowLongA
SetWindowLongA
DestroyWindow
PostQuitMessage
wsprintfA
SetWindowRgn
ReleaseDC
GetDC
GetWindowRect
GetClientRect
GetSystemMetrics
UnregisterClassA
LoadImageA
DeleteObject
CreateRectRgn
GetPixel
GetTextExtentPoint32A
CreateSolidBrush
GetStockObject
GetObjectA
GetDeviceCaps
BitBlt
CreateCompatibleBitmap
DeleteDC
SelectObject
CreateCompatibleDC
SaveDC
RestoreDC
CombineRgn
RegQueryValueExA
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
RegOpenKeyA
RegSetValueExA
RegCreateKeyA
RegQueryValueA
RegQueryInfoKeyA
RegSetValueA
RegGetKeySecurity
RegSetKeySecurity
RegDeleteKeyA
RegCreateKeyExA
RegDeleteValueA
RegOpenKeyExA
RegEnumKeyExA
RegEnumValueA
RegCloseKey
SHGetFolderPathA
SysAllocString
SysFreeString
SysStringLen
VariantClear
SysStringByteLen
OleCreateFontIndirect
VariantInit
LoadRegTypeLi
LoadTypeLi
DispCallFunc
VarUI4FromStr
SysAllocStringLen
Always
CopyMedAdFromSys32
CreateADContent
ReRunMidIE
SetMediasFileTimeTag
SetNewVersionTag
StarShowAD
playAdh
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ