PkGyjnOA
YCzXGby
gdrqqGOHxD
ltqokEMwPj
xUgvQF
Static task
static1
Behavioral task
behavioral1
Sample
474c0637a2fd6beea93c547c66136254_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
474c0637a2fd6beea93c547c66136254_JaffaCakes118.dll
Resource
win10v2004-20240709-en
Target
474c0637a2fd6beea93c547c66136254_JaffaCakes118
Size
61KB
MD5
474c0637a2fd6beea93c547c66136254
SHA1
e4e3b42fcd116466dcc70243d6a2a8aa11d28396
SHA256
ba649bdb1346c45d79c7f4141a9ae8de8c8ee315a1f551f80706d5e77dfc9371
SHA512
7d999461ea39ca6c7823b21a840612da7f657d55c43d85dce386c6e7047e9d945babdfc1e6715c90ef77a99bf588b8cd0bf1cc2ea0bebf8d208cda9cf333569a
SSDEEP
768:tsz5nqVim6u286v7KTWIOJ9RI95rwVmt5gMvyvK7wnimSqDgsD2bXb:P328a7KwRI95r2vMQC3qrQ
Checks for missing Authenticode signature.
resource |
---|
474c0637a2fd6beea93c547c66136254_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
CreateProcessA
CloseHandle
WriteFile
CreateFileA
lstrcpynA
CreateEventA
GetVersionExA
lstrcmpA
VirtualAlloc
VirtualFree
lstrcmpiA
FreeLibrary
LoadLibraryA
GetSystemDirectoryA
GetSystemTime
MoveFileA
GetCurrentThreadId
WritePrivateProfileStringA
GetWindowsDirectoryA
MoveFileExA
GetTempPathA
ReleaseMutex
GetTickCount
GetVersion
GetVolumeInformationA
SetEvent
GetFileSize
SystemTimeToFileTime
GetProcessHeap
HeapFree
ReadFile
HeapAlloc
GetTempFileNameA
DeleteFileA
GlobalAlloc
VirtualQueryEx
GetThreadContext
GlobalFree
TerminateProcess
ResumeThread
RtlUnwind
VirtualQuery
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
Sleep
ExitProcess
WaitForSingleObject
CreateMutexA
OpenProcess
lstrcpyA
lstrcatA
GetModuleHandleA
GetProcAddress
lstrlenA
GetLastError
RaiseException
GetLocaleInfoA
GetModuleFileNameA
LoadIconA
DefWindowProcA
GetWindowTextA
CloseDesktop
SetThreadDesktop
GetThreadDesktop
OpenInputDesktop
MessageBoxA
LoadCursorA
FindWindowA
SetWindowsHookExA
PostMessageA
FindWindowExA
GetWindowThreadProcessId
wsprintfA
InflateRect
IsWindowVisible
GetCursorPos
ClientToScreen
RegisterClassExA
CreateWindowExA
GetMessageA
TranslateMessage
CallNextHookEx
EqualRect
GetFocus
DispatchMessageA
RegCloseKey
RegCreateKeyExA
RegDeleteValueA
RegEnumValueA
RegDeleteKeyA
RegQueryValueExA
RegEnumKeyExA
RegOpenKeyExA
OpenProcessToken
CreateProcessAsUserA
SHDeleteKeyA
SHDeleteValueA
SHGetValueA
SHSetValueA
GetBkColor
GetBkMode
PkGyjnOA
YCzXGby
gdrqqGOHxD
ltqokEMwPj
xUgvQF
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ