DNTjJ
VbIpyqqWgF
VbYHw
XmCUSuJDE
wJllhpHpj
Static task
static1
Behavioral task
behavioral1
Sample
299fcfa2dbf1e48577723482c8a6be3f_JaffaCakes118.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
299fcfa2dbf1e48577723482c8a6be3f_JaffaCakes118.dll
Resource
win10v2004-20240704-en
Target
299fcfa2dbf1e48577723482c8a6be3f_JaffaCakes118
Size
38KB
MD5
299fcfa2dbf1e48577723482c8a6be3f
SHA1
bb53d0f8ed2e9bbc54b837c53bdfd1dd6d81e6df
SHA256
fd73a83372704a5dc2b8ffcca783ffe3c45d3b377ecdd6aac58633d117d5a38b
SHA512
a9652de2c946f4703f779e2e1f2bd62b3f6741b3123bfe4236a4170b1697e927025799d6c54d5cac65b559d5472795d02682f8e63d843f0a43d2a103f8a60390
SSDEEP
768:hM3KsNsTu8FB2bxf2eMbWpy9d3yTR1gJ/kb9DxFz0WXBmp0LQFu:e3hWa8FEx7Mb+y73J2DzvC0Q
Checks for missing Authenticode signature.
resource |
---|
299fcfa2dbf1e48577723482c8a6be3f_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetLocalTime
FindAtomA
GetModuleFileNameA
CreateMutexA
CloseHandle
GetVersion
GetTempPathA
GetSystemTime
CreateThread
GetFileSize
lstrcmpA
GetLocaleInfoA
MoveFileExA
FreeLibrary
SystemTimeToFileTime
SetEvent
VirtualFree
GetWindowsDirectoryA
OpenProcess
GetVolumeInformationA
CreateEventA
GetSystemDirectoryA
lstrcmpiA
GetProcAddress
VirtualAlloc
GetLastError
WritePrivateProfileStringA
MoveFileA
GetModuleHandleA
GetCurrentThreadId
GetVersionExA
lstrcpyA
HeapAlloc
HeapFree
GetProcessHeap
ReadFile
VirtualProtectEx
GetTempFileNameA
DeleteFileA
GetThreadContext
VirtualQueryEx
GlobalAlloc
TerminateProcess
GlobalFree
ResumeThread
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
VirtualQuery
RtlUnwind
lstrcatA
CreateProcessA
Sleep
WriteFile
GetTickCount
WaitForSingleObject
lstrcpynA
lstrlenA
CreateFileA
LoadLibraryA
ExitProcess
IsDebuggerPresent
SetThreadDesktop
CloseDesktop
OpenInputDesktop
GetThreadDesktop
FindWindowExA
CallNextHookEx
ClientToScreen
TranslateMessage
InflateRect
CreateWindowExA
DefWindowProcA
SetWindowsHookExA
GetCursorPos
GetCaretPos
PostMessageA
DispatchMessageA
GetMessageA
GetWindowRect
RegisterClassExA
GetFocus
wsprintfA
EqualRect
IsWindowVisible
FindWindowA
LoadCursorA
GetWindowThreadProcessId
LoadIconA
CreateProcessAsUserA
RegQueryValueExA
RegDeleteKeyA
RegEnumKeyExA
RegCreateKeyExA
RegOpenKeyExA
RegDeleteValueA
RegEnumValueA
RegCloseKey
OpenProcessToken
SHDeleteKeyA
SHDeleteValueA
SHSetValueA
SHGetValueA
DNTjJ
VbIpyqqWgF
VbYHw
XmCUSuJDE
wJllhpHpj
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ