DgCInst
DgCRun
DgCShutdown
DgCStartup
DgCTest
Static task
static1
Behavioral task
behavioral1
Sample
4e19657950cd3cd26b76e67c9f975474_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
4e19657950cd3cd26b76e67c9f975474_JaffaCakes118.dll
Resource
win10v2004-20240709-en
Target
4e19657950cd3cd26b76e67c9f975474_JaffaCakes118
Size
31KB
MD5
4e19657950cd3cd26b76e67c9f975474
SHA1
3bded770e1be93640bd8066f06764ac8dd25731e
SHA256
d538d15f576cffb4b5e3e08a6825c637c24ae844821c7b8a618662639d9c4d8e
SHA512
f64b14791d2f729a4e86cb7041edd886c5d47f20d9490e8f0831d629efc084f0126e1c7a940738b207a70693ebac16e2949c72ab2d9134a9ee3cc443e05886df
SSDEEP
384:EJqrsf2hYeYmUyyQKh8APtEOKOZ2CCTvFqzTCisSyy+LTFUpuzgEhpeav56ySk3f:cl5ovF8N58TiXEveGKxnOawxBnccJh
Checks for missing Authenticode signature.
resource |
---|
4e19657950cd3cd26b76e67c9f975474_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
CreateProcessA
GetTempPathA
lstrlenA
GetSystemTime
lstrcpynA
lstrcatA
CreateThread
GetLastError
WaitForSingleObject
WritePrivateProfileStringA
OpenProcess
MoveFileA
GetVolumeInformationA
lstrcmpA
CreateEventA
GetLocaleInfoA
MoveFileExA
GetModuleHandleA
FreeLibrary
GetSystemDirectoryA
SystemTimeToFileTime
GetCurrentThreadId
GetVersionExA
SetEvent
lstrcmpiA
GetProcAddress
CreateFileA
lstrcpyA
VirtualFree
GetWindowsDirectoryA
LoadLibraryA
GetFileSize
ReadProcessMemory
ReadFile
VirtualProtectEx
GetTempFileNameA
HeapAlloc
DeleteFileA
HeapFree
GetProcessHeap
GetThreadContext
VirtualQueryEx
GlobalAlloc
TerminateProcess
GlobalFree
ResumeThread
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
VirtualQuery
RtlUnwind
Sleep
GetVersion
ExitProcess
CloseHandle
CreateMutexA
GetModuleFileNameA
WriteFile
FindAtomA
GetLocalTime
VirtualAlloc
GetTickCount
IsDebuggerPresent
GetThreadDesktop
SetThreadDesktop
CloseDesktop
OpenInputDesktop
FindWindowExA
ClientToScreen
wsprintfA
LoadCursorA
GetMessageA
GetWindowThreadProcessId
CreateWindowExA
GetWindowRect
DefWindowProcA
RegisterClassExA
SetWindowsHookExA
GetCursorPos
DispatchMessageA
EqualRect
TranslateMessage
IsWindowVisible
FindWindowA
GetFocus
LoadIconA
GetCaretPos
CallNextHookEx
PostMessageA
InflateRect
OpenProcessToken
RegDeleteKeyA
RegEnumKeyExA
RegCreateKeyExA
RegOpenKeyExA
RegCloseKey
RegDeleteValueA
CreateProcessAsUserA
RegQueryValueExA
RegEnumValueA
SHDeleteValueA
SHSetValueA
SHGetValueA
SHDeleteKeyA
DgCInst
DgCRun
DgCShutdown
DgCStartup
DgCTest
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ