OpenApmlfadf
Glekjyeaftp
Rvplbtwk
Static task
static1
Behavioral task
behavioral1
Sample
17554a502169c13e89d96e75bfd6900c_JaffaCakes118.dll
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
17554a502169c13e89d96e75bfd6900c_JaffaCakes118.dll
Resource
win10v2004-20240226-en
Target
17554a502169c13e89d96e75bfd6900c_JaffaCakes118
Size
72KB
MD5
17554a502169c13e89d96e75bfd6900c
SHA1
be7b8592a995d0d173e58a1811043e49c060a4f1
SHA256
98d0c07f2713f889c5b4d3122b85573e34f555bf15b57bd6d3a29d86244eed42
SHA512
25496f90cc31cc9e4bae42f61f81fb2b0cb790a07ad0d4e64bba941f7bfe64a0001a7c57e4fac802d9e8d0fb509b463fa89853b92d02c6745515fabb365652ea
SSDEEP
768:JvBESV1kTq+5i2VWgflxV3WGAbysTGNFLZIKyu0dqVh8wm/DEwY7Av3WKBgh4:JvB9V1tWJDwbbTGNZUudVgEwIOJY4
Checks for missing Authenticode signature.
resource |
---|
17554a502169c13e89d96e75bfd6900c_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
SetFileApisToOEM
SetInformationJobObject
GetTempFileNameA
GetCommModemStatus
HeapCompact
ExpandEnvironmentStringsA
GetThreadLocale
WriteFileEx
lstrcpyA
SetLocaleInfoA
SizeofResource
WriteConsoleOutputA
SetPriorityClass
IsBadStringPtrA
GetModuleHandleA
GetProcessTimes
GetVolumePathNameA
GetProcessHeaps
CreateThread
SetVDMCurrentDirectories
SetDllDirectoryA
ReadFileEx
SetConsoleMode
GetPrivateProfileSectionNamesA
GetPriorityClass
GetStartupInfoA
GetCalendarInfoA
GetNumberOfConsoleInputEvents
VirtualAllocEx
EndUpdateResourceA
FindNextChangeNotification
GetConsoleTitleA
OpenSemaphoreA
OutputDebugStringA
GetTempPathA
GetCurrentThread
GetConsoleTitleA
SearchPathA
LZCloseFile
ReadFileScatter
SetVolumeLabelA
lstrcmpi
SetFileAttributesA
FindNextFileA
OpenJobObjectA
GetNumberOfConsoleMouseButtons
GetVersion
DisconnectNamedPipe
GetFileSizeEx
OpenFileMappingA
EscapeCommFunction
SetVolumeMountPointA
SetFileAttributesA
ReadConsoleInputA
GetThreadSelectorEntry
GetConsoleOutputCP
lstrcmpA
SetHandleInformation
ClearCommBreak
ChangeTimerQueueTimer
GetSystemPowerStatus
Module32First
FindNextVolumeMountPointW
GetComputerNameA
TerminateJobObject
GetConsoleAliasExesLengthW
GetNumberFormatA
FileTimeToSystemTime
HeapLock
GetThreadTimes
DeleteTimerQueueEx
GetCurrentConsoleFont
lstrcpynA
Process32Next
SetHandleInformation
lstrcatA
GetConsoleCursorInfo
GetProcessHandleCount
ReplaceFile
GetProcessWorkingSetSize
GetSystemTime
GetSystemWindowsDirectoryA
GetThreadPriorityBoost
SetConsoleFont
IsSystemResumeAutomatic
timeGetSystemTime
SetDoubleClickTime
CopyAcceleratorTableA
KillTimer
GetClipboardFormatNameA
CopyAcceleratorTableA
ReplyMessage
DispatchMessageA
SetWindowLongA
RegisterDeviceNotificationA
GetWindowTextLengthW
GetWindowTextA
OpenDesktopA
GetWindowTextA
OpenDesktopA
BroadcastSystemMessageExA
SetDlgItemTextA
GetThreadDesktop
CopyAcceleratorTableA
GetDCEx
GetProcessWindowStation
SetScrollPos
DeleteMenu
LoadKeyboardLayoutEx
DialogBoxIndirectParamAorW
DispatchMessageA
IntersectRect
RegisterClassExA
SetDeskWallpaper
RealGetWindowClassA
CharUpperBuffW
EnumClipboardFormats
GetActiveWindow
SetPropA
ReleaseCapture
LoadMenuA
EnumPropsExA
GetClipboardViewer
DestroyReasons
MenuWindowProcA
DefWindowProcA
EndDeferWindowPos
CascadeWindows
GetMenuCheckMarkDimensions
CreateDesktopA
GetWindowTextA
DrawTextExA
DlgDirSelectComboBoxExA
RegisterShellHookWindow
GetReasonTitleFromReasonCode
InSendMessageEx
GetClassWord
SetClipboardViewer
CheckMenuRadioItem
GetClipboardViewer
SetClipboardData
EnumPropsExA
SetWindowsHookA
EnumWindowStationsA
SendNotifyMessageA
SetScrollPos
LoadMenuA
ShowWindow
PrintWindow
TranslateAccelerator
DlgDirSelectExA
RegisterServicesProcess
GetQueueStatus
OemToCharBuffA
PaintMenuBar
InSendMessage
CliImmSetHotKey
DeleteMenu
SetWindowLongA
GetClassNameA
BroadcastSystemMessageA
IsCharUpperA
SetParent
MessageBoxTimeoutA
SetSystemMenu
LockWindowUpdate
PrivateExtractIconExA
UnregisterUserApiHook
CalcMenuBar
SetMenuItemInfoA
LoadImageA
OpenApmlfadf
Glekjyeaftp
Rvplbtwk
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ