DPyfhHLyIC
IjfiPwS
TUzbMUIq
ZQCQdc
wUqSsvaHN
Static task
static1
Behavioral task
behavioral1
Sample
2f54fbc378c13c95df639f518c513e52_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2f54fbc378c13c95df639f518c513e52_JaffaCakes118.dll
Resource
win10v2004-20240704-en
Target
2f54fbc378c13c95df639f518c513e52_JaffaCakes118
Size
104KB
MD5
2f54fbc378c13c95df639f518c513e52
SHA1
8ff12b49f5f2a2d8d8b5c682205c87ee77337d02
SHA256
1d2ae16ff60c79e23e979fa84522b7b0045f0c926ecd9630fac0b7156146e01f
SHA512
c48db8b20d812b869aceed5b29b307b48a3c13dcf612e37ea2dfa2b2fb90b36477dd18beca84b9a41ff8e69037615a221ad1291e8253b3ff6555b78bb0870473
SSDEEP
3072:K3QWWgHlvrI5hX9C7D4WE00IQqeRtRecG:2bHC5LC7D4e1
Checks for missing Authenticode signature.
resource |
---|
2f54fbc378c13c95df639f518c513e52_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
lstrcpynA
lstrcpyA
GetProcessHeap
HeapFree
ReadFile
HeapAlloc
GetFileSize
Sleep
OpenProcess
GetCurrentThreadId
GetTempFileNameA
GetTempPathA
DeleteFileA
VirtualAlloc
GlobalAlloc
FreeLibrary
LoadLibraryA
VirtualQueryEx
GetThreadContext
GlobalFree
TerminateProcess
ResumeThread
VirtualFree
CreateEventA
GetVersionExA
lstrcmpA
lstrcmpiA
GetSystemDirectoryA
GetSystemTime
MoveFileA
WritePrivateProfileStringA
GetWindowsDirectoryA
MoveFileExA
ReleaseMutex
GetTickCount
lstrcatA
GetVolumeInformationA
SetEvent
SystemTimeToFileTime
HeapSize
LCMapStringW
LCMapStringA
GetStringTypeW
MultiByteToWideChar
GetStringTypeA
InitializeCriticalSectionAndSpinCount
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
HeapReAlloc
IsValidCodePage
GetOEMCP
CreateFileA
WriteFile
CloseHandle
CreateProcessA
GetVersion
ExitProcess
GetModuleHandleA
GetProcAddress
WaitForSingleObject
FindAtomA
lstrlenA
GetACP
GetCPInfo
EnterCriticalSection
LeaveCriticalSection
CreateMutexA
GetLocaleInfoA
GetLastError
GetCommandLineA
RtlUnwind
VirtualQuery
GetModuleHandleW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
InterlockedDecrement
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
HeapCreate
HeapDestroy
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetWindowTextA
FindWindowExA
MessageBoxA
OpenInputDesktop
GetThreadDesktop
SetThreadDesktop
FindWindowA
GetWindowThreadProcessId
CloseDesktop
InflateRect
EqualRect
GetFocus
ClientToScreen
GetCursorPos
GetWindowRect
IsWindowVisible
DefWindowProcA
LoadIconA
LoadCursorA
RegisterClassExA
CreateWindowExA
GetMessageA
TranslateMessage
DispatchMessageA
wsprintfA
RegDeleteKeyA
OpenProcessToken
RegOpenKeyExA
RegEnumKeyExA
RegQueryValueExA
CreateProcessAsUserA
RegEnumValueA
RegDeleteValueA
RegCreateKeyExA
RegCloseKey
SHDeleteKeyA
SHDeleteValueA
SHGetValueA
SHSetValueA
GetBkColor
GetBkMode
DPyfhHLyIC
IjfiPwS
TUzbMUIq
ZQCQdc
wUqSsvaHN
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ