xALInst
xALRun
xALShutdown
xALStartup
xALTest
Static task
static1
Behavioral task
behavioral1
Sample
32819a6c21524b7749f7987dea589368_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
32819a6c21524b7749f7987dea589368_JaffaCakes118.dll
Resource
win10v2004-20240709-en
Target
32819a6c21524b7749f7987dea589368_JaffaCakes118
Size
31KB
MD5
32819a6c21524b7749f7987dea589368
SHA1
dc5fa6d6880a1285c2a8fa7a6ec403b2883909a1
SHA256
f6389001d87fe4f947eedbc532c619e26d32579dfb9a88db991a35fb74fd42e5
SHA512
e68ff6fd42898a2881a1d2b989a8f29a5b9a5a886081d0a892294bf74a525ed2435d056d562608db05b3846be1c0cf564916e402d94e16ded3349c540fbabbbb
SSDEEP
768:l3u+ng3Wxo+hk7iwbF1KInUJ/3pZBiVDfwmqy:l3Vo+hItbXyJBAfwmq
Checks for missing Authenticode signature.
resource |
---|
32819a6c21524b7749f7987dea589368_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
FindAtomA
GetTickCount
GetModuleFileNameA
CreateMutexA
CloseHandle
WriteFile
GetVersion
GetTempPathA
GetSystemTime
GetCurrentThreadId
GetVersionExA
SetEvent
lstrcmpiA
GetProcAddress
VirtualAlloc
VirtualFree
lstrcpyA
CopyFileA
GetWindowsDirectoryA
GetFileSize
LoadLibraryA
OpenProcess
GetVolumeInformationA
WritePrivateProfileStringA
lstrcmpA
MoveFileA
GetLocaleInfoA
GetLocalTime
MoveFileExA
FreeLibrary
GetModuleHandleA
SystemTimeToFileTime
GetSystemDirectoryA
WriteProcessMemory
DeleteFileA
HeapAlloc
HeapFree
GetProcessHeap
ReadProcessMemory
ReadFile
VirtualProtectEx
GetTempFileNameA
VirtualQueryEx
GlobalAlloc
TerminateProcess
GlobalFree
ResumeThread
GetThreadContext
SetThreadContext
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
VirtualQuery
RtlUnwind
WaitForSingleObject
GetLastError
lstrcpynA
lstrlenA
lstrcatA
CreateFileA
CreateProcessA
CreateThread
CreateEventA
Sleep
IsDebuggerPresent
SetThreadDesktop
SetWindowsHookExA
GetWindowRect
GetCursorPos
FindWindowExA
GetFocus
PostMessageA
CallNextHookEx
EqualRect
wsprintfA
GetThreadDesktop
OpenInputDesktop
GetCaretPos
ClientToScreen
GetWindowThreadProcessId
IsWindowVisible
FindWindowA
InflateRect
CloseDesktop
RegOpenKeyExA
CreateProcessAsUserA
RegDeleteValueA
RegQueryValueExA
OpenProcessToken
RegDeleteKeyA
RegEnumValueA
RegEnumKeyExA
RegCloseKey
SHDeleteKeyA
SHDeleteValueA
SHSetValueA
SHGetValueA
GetAdaptersInfo
xALInst
xALRun
xALShutdown
xALStartup
xALTest
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ