HdyInst
HdyRun
HdyShutdown
HdyStartup
HdyTest
Static task
static1
Behavioral task
behavioral1
Sample
281c2a0bc3a8a649aab2ed282756b530_JaffaCakes118.dll
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
281c2a0bc3a8a649aab2ed282756b530_JaffaCakes118.dll
Resource
win10v2004-20240704-en
Target
281c2a0bc3a8a649aab2ed282756b530_JaffaCakes118
Size
32KB
MD5
281c2a0bc3a8a649aab2ed282756b530
SHA1
f4f806277341b893badc39311d26bf9841b34abb
SHA256
fc67f609e2f392a9fb94282146838548c4cd53d9944b8ad9e6fb9dedf92a62dc
SHA512
06144842e0f3a1fcd475dc9d220156b9ad49e2fa21d48330d3b01bebd9a0f30733276b63e03c8b8618327ff6cb131621b88166ca832795fb5f424b2d9c25d759
SSDEEP
384:g0bQXQycW58JPsXZw/HeNQy+D/WIAS/nRiNVUpekxsTiGzSSK0aHmSszHvwYFWfX:Aj2RiNVUpekxscSUHMz4PJWKB+TZX5
Checks for missing Authenticode signature.
resource |
---|
281c2a0bc3a8a649aab2ed282756b530_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
FindAtomA
GetModuleFileNameA
CreateMutexA
WriteFile
CloseHandle
GetVersion
GetTempPathA
Sleep
GetSystemTime
lstrcmpiA
GetProcAddress
SetEvent
lstrcpyA
VirtualAlloc
VirtualFree
GetWindowsDirectoryA
LoadLibraryA
WritePrivateProfileStringA
MoveFileA
GetFileSize
OpenProcess
GetVolumeInformationA
lstrcmpA
CreateEventA
GetModuleHandleA
GetLocaleInfoA
MoveFileExA
GetTickCount
GetCurrentThreadId
GetSystemDirectoryA
GetVersionExA
SystemTimeToFileTime
HeapAlloc
WriteProcessMemory
DeleteFileA
HeapFree
GetProcessHeap
ReadProcessMemory
ReadFile
VirtualProtectEx
GetTempFileNameA
VirtualQueryEx
GlobalAlloc
TerminateProcess
GlobalFree
ResumeThread
GetThreadContext
SetThreadContext
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
VirtualQuery
RtlUnwind
GetLocalTime
WaitForSingleObject
GetLastError
lstrcpynA
lstrlenA
CreateFileA
lstrcatA
CreateThread
FreeLibrary
CreateProcessA
IsDebuggerPresent
SetThreadDesktop
SetWindowsHookExA
GetWindowRect
GetCursorPos
FindWindowExA
GetFocus
CallNextHookEx
PostMessageA
wsprintfA
EqualRect
GetThreadDesktop
OpenInputDesktop
GetCaretPos
IsWindowVisible
FindWindowA
InflateRect
GetWindowThreadProcessId
ClientToScreen
CloseDesktop
RegCloseKey
CreateProcessAsUserA
RegQueryValueExA
RegEnumValueA
OpenProcessToken
RegDeleteKeyA
RegEnumKeyExA
RegOpenKeyExA
RegDeleteValueA
SHDeleteKeyA
SHDeleteValueA
SHSetValueA
SHGetValueA
HdyInst
HdyRun
HdyShutdown
HdyStartup
HdyTest
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ