Aetxml
BetDml
DllRundll
GetDDaa
setxml
sssweew
Static task
static1
Behavioral task
behavioral1
Sample
26bda7337f4da70a7e9fe384e72dceaf_JaffaCakes118.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
26bda7337f4da70a7e9fe384e72dceaf_JaffaCakes118.dll
Resource
win10v2004-20240704-en
Target
26bda7337f4da70a7e9fe384e72dceaf_JaffaCakes118
Size
40KB
MD5
26bda7337f4da70a7e9fe384e72dceaf
SHA1
ac7e699d5d4712af15f1fde946f806baa0135c45
SHA256
4265a38267d7167765ffb56e896189662ccf773630d976d95646be7f9a4b1b5d
SHA512
4813bc1c56ccd5351db216aa53c4746c74aa3ccb19fd74e1dfa8354119bcf647058d47a16195823e47e9e1b04492de4d5bd8f4ffd7fecdb46c9b57ae8dd6141b
SSDEEP
384:uVG8Pi90VF8mbTueIkwBkv/z78PNOk1cktK9kmF9vVV7WSI9WOQ1:UD/hIkuk3IO8ckt0kmtSjA
Checks for missing Authenticode signature.
resource |
---|
26bda7337f4da70a7e9fe384e72dceaf_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetModuleFileNameA
InterlockedDecrement
CopyFileA
lstrlenA
HeapDestroy
DeleteCriticalSection
DisableThreadLibraryCalls
InitializeCriticalSection
FlushInstructionCache
GetCurrentProcess
InterlockedIncrement
GetTickCount
Sleep
LoadLibraryA
GetSystemDirectoryA
GetFileAttributesA
GetWindowsDirectoryA
GetShortPathNameA
DebugBreak
OutputDebugStringA
lstrcpynW
lstrcpynA
GetProcAddress
GetVersionExA
EnterCriticalSection
GetCurrentThreadId
LeaveCriticalSection
lstrcatA
GetMenuItemInfoA
AppendMenuA
GetMenuItemCount
CreatePopupMenu
TrackPopupMenuEx
GetMonitorInfoA
MonitorFromPoint
IsWindow
MapWindowPoints
PtInRect
DestroyMenu
CallWindowProcA
GetWindowLongA
GetTopWindow
GetClassNameA
GetParent
GetWindow
MessageBeep
InvalidateRect
RemoveMenu
DispatchMessageA
TranslateMessage
GetMessageA
CharNextA
SetWindowPos
SendMessageA
GetWindowTextA
GetCursorPos
GetWindowRect
SetCursorPos
mouse_event
KillTimer
PostMessageA
GetLastInputInfo
SetTimer
DefWindowProcA
TranslateAcceleratorA
GetClassInfoExA
LoadCursorA
wsprintfA
LoadImageA
RegisterClassExA
SetWindowLongA
CreateWindowExA
LoadStringA
LoadMenuA
SetFocus
PostQuitMessage
wvsprintfA
GetClientRect
LoadAcceleratorsA
DestroyWindow
FindWindowA
ShowWindow
PeekMessageA
LoadStringW
RegCloseKey
RegCreateKeyExA
RegSetValueExA
RegOpenKeyA
RegQueryValueExA
ShellExecuteA
SHGetSpecialFolderPathA
OleUninitialize
OleInitialize
atoi
isdigit
wcslen
strstr
_initterm
_purecall
??2@YAPAXI@Z
memmove
realloc
__CxxFrameHandler
??3@YAXPAX@Z
strrchr
free
malloc
_adjust_fdiv
time
Aetxml
BetDml
DllRundll
GetDDaa
setxml
sssweew
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ