EvtShutdown
EvtStartup
StartMain
inst
run
Static task
static1
Behavioral task
behavioral1
Sample
23be79913cf97c25a833bba61eab149f_JaffaCakes118.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
23be79913cf97c25a833bba61eab149f_JaffaCakes118.dll
Resource
win10v2004-20240508-en
Target
23be79913cf97c25a833bba61eab149f_JaffaCakes118
Size
19KB
MD5
23be79913cf97c25a833bba61eab149f
SHA1
374aa8367f6c69fd01e8753855dc434029436351
SHA256
33310ed9d89bac7dec995a0955102a3215519d9eaeefb71a9ccc9231b4fb2281
SHA512
901409191a64b15eb2f1642a52645944dab4ab71f81092e80b48a4b76c12c81d634cd8f31cc797de391fc872d52b1655088b39000bad636bde6b6f84144976d5
SSDEEP
384:e5qONGvqEXGoe5hUWX7OvwyO2a+OtTtwPvWfe0d:e5qO8/XGoeDOvO2a+OtTaP
Checks for missing Authenticode signature.
resource |
---|
23be79913cf97c25a833bba61eab149f_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
SHDeleteKeyA
SHDeleteValueA
SHGetValueA
SHSetValueA
RasEnumDevicesA
RtlUnwind
InterlockedExchange
lstrcpyA
CreateFileA
GetFileSize
lstrcmpA
lstrlenA
GetLocaleInfoA
MoveFileExA
FreeLibrary
WaitForSingleObject
SetEvent
VirtualFree
GetWindowsDirectoryA
OpenProcess
CreateEventA
CreateProcessA
GetSystemDirectoryA
lstrcatA
GetLastError
lstrcmpiA
GetProcAddress
VirtualAlloc
CopyFileA
GetLocalTime
LoadLibraryA
WritePrivateProfileStringA
MoveFileA
GetModuleHandleA
GetCurrentThreadId
CloseHandle
GetVersion
GetSystemTime
VirtualQuery
lstrcpynA
WriteFile
Sleep
GetModuleFileNameA
CreateMutexA
CreateThread
HeapAlloc
HeapFree
GetProcessHeap
ReadProcessMemory
TerminateProcess
ReadFile
VirtualProtectEx
GetTempFileNameA
GetTempPathA
WriteProcessMemory
GetThreadDesktop
PostMessageA
OpenInputDesktop
CallNextHookEx
FindWindowExA
wsprintfA
CloseDesktop
SetThreadDesktop
FindWindowA
SetWindowsHookExA
GetWindowThreadProcessId
OpenProcessToken
ImpersonateLoggedOnUser
CreateProcessAsUserA
EvtShutdown
EvtStartup
StartMain
inst
run
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ