Qy001DoMainWssk
Qy001Service
ServiceMain
Static task
static1
Behavioral task
behavioral1
Sample
2f65ff12d421f85d40a4aa4c43fd7527_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2f65ff12d421f85d40a4aa4c43fd7527_JaffaCakes118.dll
Resource
win10v2004-20240704-en
Target
2f65ff12d421f85d40a4aa4c43fd7527_JaffaCakes118
Size
131KB
MD5
2f65ff12d421f85d40a4aa4c43fd7527
SHA1
8b5cb01b0b306212777c8e9f6804919b7cafff50
SHA256
e1e8e68478a2438116206fadad89c3da489a2244d548c5165757a748a946e8fe
SHA512
f46126458e64f57680cd64b2e230559b21a02720e29dc3ca465bd0982382dafb7600c70f2fa0a235902762b1b1f265e2f942d86c096e9f76b82f036f2843abab
SSDEEP
3072:uStgpPOWSCO5W21179UVAAFitfn3YzCqrKuRB1GHL:ptG3SxJUVAozPKi
Checks for missing Authenticode signature.
resource |
---|
2f65ff12d421f85d40a4aa4c43fd7527_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
ExitWindowsEx
GetDIBits
RegCloseKey
ShellExecuteA
CreateStreamOnHGlobal
listen
StrRChrA
GetModuleFileNameExA
ImmReleaseContext
capCreateCaptureWindowA
waveInUnprepareHeader
strrchr
OpenProcess
GetModuleHandleA
GetProcAddress
VirtualProtect
Qy001DoMainWssk
Qy001Service
ServiceMain
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ