??0CNGCTraceProxy@@QAE@ABV0@@Z
??0CNGCTraceProxy@@QAE@XZ
??4CNGCTraceProxy@@QAEAAV0@ABV0@@Z
??_7CNGCTraceProxy@@6B@
Static task
static1
Behavioral task
behavioral1
Sample
24bfeaf7c9e9faa1ee5502868bdc9911_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
24bfeaf7c9e9faa1ee5502868bdc9911_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Target
24bfeaf7c9e9faa1ee5502868bdc9911_JaffaCakes118
Size
748KB
MD5
24bfeaf7c9e9faa1ee5502868bdc9911
SHA1
c4cea369ac90e16fc49c0356d33207597693756e
SHA256
6f270c18d9546047c80ea30cf4d16e1645860faadf3d3ecf2571e2a9e94eb409
SHA512
39208864c83b7c19faad8be04207a6c197e62be0fb58847af113f1961f6b808b7b066ca8072ccac14109b8b937ff359c9a13b294a55b67fe7bfebd783665c876
SSDEEP
12288:vOU/qzbMTOmr3D9O3P2vOpPrxTutfi8wDwOVkRjD3/6tAdu6tsu83nDOeDYXkQHJ:v3qzoTOmr3D9O3P2vOpPrxTd8wE/NXkU
Checks for missing Authenticode signature.
resource |
---|
24bfeaf7c9e9faa1ee5502868bdc9911_JaffaCakes118 |
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
ntohl
htonl
ioctlsocket
gethostbyname
WSAGetLastError
gethostbyaddr
gethostname
inet_addr
connect
WSAStartup
select
htons
shutdown
setsockopt
recv
bind
socket
__WSAFDIsSet
WSASetLastError
closesocket
send
listen
accept
ntohs
InternetGetConnectedState
InternetConnectA
InternetReadFile
InternetSetOptionA
HttpOpenRequestA
HttpSendRequestA
InternetOpenA
InternetCloseHandle
DeleteUrlCacheEntry
RetrieveUrlCacheEntryStreamA
FindNextUrlCacheGroup
FindFirstUrlCacheGroup
UnlockUrlCacheEntryStream
DeleteUrlCacheGroup
ReadUrlCacheEntryStream
FindFirstUrlCacheEntryA
HttpQueryInfoA
FindCloseUrlCache
FindNextUrlCacheEntryA
ImageList_LoadImageA
UuidCreate
midiInGetNumDevs
waveInGetNumDevs
auxGetNumDevs
joyGetNumDevs
mixerGetNumDevs
midiOutGetNumDevs
waveOutGetNumDevs
HeapDestroy
HeapSize
HeapCreate
VirtualFree
CompareStringA
TerminateProcess
HeapReAlloc
GetOEMCP
UnhandledExceptionFilter
LCMapStringW
LCMapStringA
GetCPInfo
FreeLibrary
GetTickCount
LeaveCriticalSection
GetLastError
GetProcAddress
EnterCriticalSection
LoadLibraryA
WaitForSingleObject
OpenProcess
Sleep
CreateProcessA
CreateDirectoryA
GetStartupInfoA
RemoveDirectoryA
CopyFileA
GetTempFileNameA
OpenMutexA
CloseHandle
GetCurrentProcessId
GetTempPathA
DeleteFileA
GetWindowsDirectoryA
GetSystemDirectoryA
GetLocalTime
InterlockedDecrement
InitializeCriticalSection
DeleteCriticalSection
InterlockedIncrement
SetEvent
CreateSemaphoreA
ReleaseSemaphore
WaitForMultipleObjects
ResumeThread
IsBadReadPtr
GetFileAttributesA
GetModuleFileNameA
CreateFileA
SetFilePointer
WriteFile
ExitProcess
GetModuleHandleA
FindResourceA
LoadResource
SizeofResource
LockResource
IsBadWritePtr
CreateEventA
MoveFileA
OpenEventA
MapViewOfFile
UnmapViewOfFile
CreateFileMappingA
CreateMutexA
ReleaseMutex
GetCurrentThreadId
MulDiv
InterlockedExchange
SetConsoleCtrlHandler
MoveFileExA
SetFileAttributesA
WritePrivateProfileStringA
GetSystemDefaultLangID
GlobalMemoryStatus
GetUserDefaultLCID
GetLogicalDrives
GetSystemDefaultLCID
GetDriveTypeA
WideCharToMultiByte
GetTimeZoneInformation
FindFirstFileA
FindClose
IsDebuggerPresent
QueryPerformanceCounter
QueryPerformanceFrequency
FormatMessageA
lstrcmpiA
GetVersionExA
SystemTimeToFileTime
FileTimeToSystemTime
GetSystemTime
LocalFileTimeToFileTime
ResetEvent
GetComputerNameA
GetCurrentProcess
GetCurrentThread
SetLastError
GetSystemInfo
lstrlenA
RaiseException
HeapFree
MultiByteToWideChar
GetACP
GetLocaleInfoA
FindNextFileA
GetDiskFreeSpaceA
ExitThread
CreateThread
GetTimeFormatA
GetDateFormatA
GetCommandLineA
FlushFileBuffers
SetFileTime
HeapAlloc
VirtualProtect
GetStdHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
SetStdHandle
SetUnhandledExceptionFilter
GetStringTypeA
GetStringTypeW
EnumSystemLocalesA
IsValidLocale
VirtualAlloc
VirtualQuery
RtlUnwind
IsValidCodePage
IsBadCodePtr
SetEndOfFile
ReadFile
GetLocaleInfoW
SetEnvironmentVariableA
CompareStringW
LocalFree
TlsAlloc
TlsFree
TlsSetValue
TlsGetValue
GetSystemTimeAsFileTime
FileTimeToLocalFileTime
GetFileInformationByHandle
GetUserDefaultLangID
PeekNamedPipe
SetDlgItemTextA
IsDialogMessageA
GetWindowRect
CreateDialogParamA
SetWindowLongA
GetWindowLongA
GetDlgItem
SetWindowPos
MoveWindow
GetWindowThreadProcessId
EndPaint
SetWindowRgn
SetTimer
KillTimer
DrawTextA
GetClientRect
DestroyMenu
BeginPaint
GetDC
SetFocus
ReleaseDC
RemoveMenu
PostMessageA
GetCursorPos
GetDesktopWindow
FindWindowA
DestroyWindow
RegisterClassExA
PostQuitMessage
RegisterWindowMessageA
GetMenu
TranslateAcceleratorA
LoadAcceleratorsA
CallWindowProcA
CheckMenuItem
GetClassNameA
SetActiveWindow
TrackPopupMenu
GetSubMenu
SetForegroundWindow
SendMessageA
EnableWindow
EndDialog
MsgWaitForMultipleObjects
TranslateMessage
CreateWindowExA
PeekMessageA
DefWindowProcA
ShowWindow
SetWindowTextA
UpdateWindow
LoadCursorA
IsWindow
PostThreadMessageA
DispatchMessageA
MessageBoxA
SetWindowsHookExA
UnhookWindowsHookEx
SetDlgItemInt
EnumWindows
ExitWindowsEx
LoadMenuA
LoadIconA
InvalidateRect
CallNextHookEx
GetMessageA
BitBlt
SetTextColor
DeleteDC
CreateDIBSection
CreateFontA
GetDeviceCaps
SetBkMode
DeleteObject
SelectObject
CreateCompatibleDC
CombineRgn
CreateRectRgn
GetStockObject
GetSaveFileNameA
FindTextA
RegSetValueExA
RegDeleteValueA
RegCreateKeyExA
RegQueryValueExA
RegEnumValueA
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
RegEnumKeyExA
RegOpenKeyA
RegCreateKeyA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegNotifyChangeKeyValue
RegOpenKeyExA
RegDeleteKeyA
RegCloseKey
RegEnumKeyA
Shell_NotifyIconA
SHGetSpecialFolderPathA
CoCreateInstance
OleRun
CoInitialize
CoUninitialize
VariantInit
SafeArrayGetUBound
SafeArrayUnaccessData
SafeArrayAccessData
SafeArrayGetLBound
SysStringLen
SysAllocString
SysFreeString
VariantClear
SHCopyKeyA
VerQueryValueA
GetFileVersionInfoA
GetFileVersionInfoSizeA
??0CNGCTraceProxy@@QAE@ABV0@@Z
??0CNGCTraceProxy@@QAE@XZ
??4CNGCTraceProxy@@QAEAAV0@ABV0@@Z
??_7CNGCTraceProxy@@6B@
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ