AiuOIUTpFFpJ
GaAhDDUQr
MSNniJdd
TzIIUauEy
VmsnoVCPMqWK
Static task
static1
Behavioral task
behavioral1
Sample
433e375b41cde580356ce838d8baf07f_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
433e375b41cde580356ce838d8baf07f_JaffaCakes118.dll
Resource
win10v2004-20240709-en
Target
433e375b41cde580356ce838d8baf07f_JaffaCakes118
Size
102KB
MD5
433e375b41cde580356ce838d8baf07f
SHA1
fd71a099a6686743f25d876b3d878e46feac878f
SHA256
156a5954ab5d1e9383322d67a532291a3309d907b66dd41cc13816ff3535dfa2
SHA512
6bf1a4bd14bcba002c3f271d05849b9897aef0cebe866d97d0a867608c22429e0894c0b646a0f5e15f2fdaf6c9c3b78cbbf90812589d70776e997f1fbc4691cc
SSDEEP
1536:sZ6cYEzNJvwKmAszBi08JLnakhF5tZp5swzitJBYWyKF9dFzLH0Q1Rrn8M:xjKmrk0KnVFDDwnb930cRr7
Checks for missing Authenticode signature.
resource |
---|
433e375b41cde580356ce838d8baf07f_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
lstrlenA
FindAtomA
GetCurrentThreadId
GetProcessHeap
HeapFree
QueryPerformanceCounter
ReadFile
HeapAlloc
GetFileSize
Sleep
GetCurrentProcess
OpenProcess
GetTempFileNameA
GetTempPathA
DeleteFileA
VirtualAlloc
GlobalAlloc
FreeLibrary
LoadLibraryA
VirtualQueryEx
GetThreadContext
GlobalFree
TerminateProcess
ResumeThread
VirtualFree
CreateEventA
GetVersionExA
lstrcmpA
lstrcmpiA
GetSystemDirectoryA
GetSystemTime
MoveFileA
WritePrivateProfileStringA
GetWindowsDirectoryA
MoveFileExA
ReleaseMutex
lstrcpynA
GetLocaleInfoA
GetVolumeInformationA
SetEvent
SystemTimeToFileTime
HeapSize
LCMapStringW
LCMapStringA
GetStringTypeW
MultiByteToWideChar
GetStringTypeA
InitializeCriticalSectionAndSpinCount
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
HeapReAlloc
IsValidCodePage
GetOEMCP
GetACP
lstrcatA
CreateFileA
WriteFile
CloseHandle
CreateProcessA
GetVersion
ExitProcess
GetModuleHandleA
GetProcAddress
WaitForSingleObject
lstrcpyA
GetCPInfo
EnterCriticalSection
LeaveCriticalSection
GetSystemTimeAsFileTime
CreateMutexA
GetTickCount
GetLastError
GetCommandLineA
RtlUnwind
VirtualQuery
GetModuleHandleW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
InterlockedDecrement
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
HeapCreate
HeapDestroy
GetCurrentProcessId
GetWindowTextA
MessageBoxA
OpenInputDesktop
GetThreadDesktop
SetThreadDesktop
FindWindowA
GetWindowThreadProcessId
GetCursorPos
CloseDesktop
InflateRect
GetWindowRect
GetFocus
ClientToScreen
EqualRect
DefWindowProcA
LoadIconA
LoadCursorA
RegisterClassExA
CreateWindowExA
GetMessageA
TranslateMessage
DispatchMessageA
wsprintfA
IsWindowVisible
FindWindowExA
RegDeleteKeyA
OpenProcessToken
RegOpenKeyExA
RegEnumKeyExA
RegQueryValueExA
CreateProcessAsUserA
RegEnumValueA
RegDeleteValueA
RegCreateKeyExA
RegCloseKey
SHDeleteKeyA
SHDeleteValueA
SHGetValueA
SHSetValueA
GetBkMode
GetBkColor
AiuOIUTpFFpJ
GaAhDDUQr
MSNniJdd
TzIIUauEy
VmsnoVCPMqWK
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ