Always
BEginReportInfo
PecialProcessMedia
RappShowAD
ReneralMidIE
SEStation
SEndStation
SetMediaProcessID
playAdh
Static task
static1
Behavioral task
behavioral1
Sample
5b4262e199aea211251696c5fc6df032_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
5b4262e199aea211251696c5fc6df032_JaffaCakes118.dll
Resource
win10v2004-20240709-en
Target
5b4262e199aea211251696c5fc6df032_JaffaCakes118
Size
496KB
MD5
5b4262e199aea211251696c5fc6df032
SHA1
f4003a5c95c93dc2b475f93b09e187a2acd4882c
SHA256
6d07fecb16871b0665a6b3e1945fc86d8dfb6051503558850e38abf5b2f4e10a
SHA512
18a2129f030d15371c42d71848d7e5d901662cf7fcca93dbd289c63671142a8a3b5c73f5f44a0821c469b44b532733e79352ef766f599b5178f6528c017aaaf3
SSDEEP
12288:q+sH8CXReSMUNnCqr2dZd58w0EDjQhDMOkusKCrz+2vBPQAixxQIx3/5Fpbdb++9:FL0eSM8+P8w1DsRpm+2lzzIx3/5FpbdI
Checks for missing Authenticode signature.
resource |
---|
5b4262e199aea211251696c5fc6df032_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
WSACleanup
WSAStartup
gethostbyname
CoTaskMemRealloc
CLSIDFromString
CLSIDFromProgID
CoGetClassObject
OleLockRunning
CoTaskMemAlloc
StringFromGUID2
OleUninitialize
OleInitialize
CreateStreamOnHGlobal
CoCreateInstance
CoUninitialize
CoInitialize
CoTaskMemFree
InternetReadFile
HttpSendRequestA
FindFirstUrlCacheEntryA
FindNextUrlCacheEntryA
GetUrlCacheEntryInfoA
InternetCrackUrlA
InternetOpenA
InternetConnectA
InternetCloseHandle
HttpOpenRequestA
DeleteUrlCacheEntry
URLDownloadToFileA
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
OpenFileMappingA
ReleaseMutex
FlushViewOfFile
WaitForSingleObject
CreateMutexA
FindClose
FindFirstFileA
GetCurrentDirectoryA
CopyFileA
SetFileAttributesA
GetLastError
GetSystemTimeAsFileTime
SetErrorMode
GetPrivateProfileSectionA
SetEndOfFile
FlushFileBuffers
GetDiskFreeSpaceExA
SetFilePointer
GetBinaryTypeA
GetFullPathNameA
QueryDosDeviceA
MultiByteToWideChar
GetShortPathNameA
GetTempFileNameA
GetTempPathA
Sleep
GetWindowsDirectoryA
GetVolumeInformationA
GetSystemDirectoryA
DeleteFileA
lstrcmpA
FindNextFileA
lstrcatA
lstrcpyA
CreateDirectoryA
GetVersionExA
SetProcessWorkingSetSize
GetCurrentProcess
GetTickCount
SetPriorityClass
InterlockedExchange
GetACP
GetLocaleInfoA
GetThreadLocale
EnterCriticalSection
LeaveCriticalSection
FlushInstructionCache
HeapFree
GetProcessHeap
HeapAlloc
WideCharToMultiByte
InterlockedDecrement
lstrlenA
GetCurrentThreadId
GlobalUnlock
GlobalLock
GlobalAlloc
lstrlenW
MulDiv
InterlockedIncrement
GetModuleFileNameA
CloseHandle
FreeLibrary
SizeofResource
LoadResource
FindResourceA
LoadLibraryExA
lstrcmpiA
lstrcpynA
IsDBCSLeadByte
GetProcAddress
LoadLibraryA
CreateThread
SetEvent
OpenEventA
CreateProcessA
GetLogicalDriveStringsA
WaitForMultipleObjects
CreateEventA
Module32Next
Module32First
CreateToolhelp32Snapshot
Process32Next
Process32First
ReadFile
CreateFileA
TerminateProcess
DeviceIoControl
GetFileAttributesA
VirtualAlloc
VirtualFree
WriteFile
GetStdHandle
QueryPerformanceCounter
HeapCreate
HeapDestroy
GetLocalTime
TlsGetValue
TlsSetValue
TlsFree
SetLastError
TlsAlloc
GetOEMCP
GetCPInfo
LCMapStringW
LCMapStringA
RemoveDirectoryA
GetCommandLineA
HeapReAlloc
VirtualQuery
GetSystemInfo
VirtualProtect
GetDriveTypeA
FileTimeToLocalFileTime
FileTimeToSystemTime
ExitProcess
RtlUnwind
SetUnhandledExceptionFilter
DeleteCriticalSection
InitializeCriticalSection
RaiseException
GetCurrentProcessId
HeapSize
SetHandleCount
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
UnhandledExceptionFilter
GetTimeZoneInformation
GetStringTypeA
GetStringTypeW
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
IsValidCodePage
IsBadReadPtr
IsBadCodePtr
SetStdHandle
GetLocaleInfoW
CompareStringA
CompareStringW
SetEnvironmentVariableA
LocalFree
GetModuleHandleA
IsBadWritePtr
GetForegroundWindow
SetForegroundWindow
SystemParametersInfoA
MapWindowPoints
ShowWindow
UpdateWindow
PeekMessageA
GetMessageA
TranslateMessage
DispatchMessageA
AdjustWindowRectEx
FindWindowExA
PostMessageA
CreateAcceleratorTableA
CharNextA
GetParent
GetClassNameA
RedrawWindow
GetDlgItem
IsWindow
DestroyAcceleratorTable
GetFocus
IsChild
GetWindow
EnumWindows
SetFocus
BeginPaint
EndPaint
GetDesktopWindow
InvalidateRgn
InvalidateRect
FillRect
SetCapture
ReleaseCapture
GetSysColor
CreateWindowExA
CallWindowProcA
RegisterWindowMessageA
RegisterClassExA
GetWindowTextLengthA
GetWindowTextA
DefWindowProcA
SetActiveWindow
LoadCursorA
GetClassInfoExA
KillTimer
SetTimer
SetWindowPos
MoveWindow
SetWindowTextA
SendMessageA
GetWindowLongA
SetWindowLongA
DestroyWindow
PostQuitMessage
wsprintfA
SetWindowRgn
ReleaseDC
GetDC
GetWindowRect
GetClientRect
LoadImageA
UnregisterClassA
GetSystemMetrics
CombineRgn
DeleteObject
CreateRectRgn
GetTextExtentPoint32A
GetTextCharsetInfo
CreateSolidBrush
GetStockObject
GetObjectA
GetDeviceCaps
BitBlt
CreateCompatibleBitmap
DeleteDC
SelectObject
SaveDC
RestoreDC
GetPixel
CreateCompatibleDC
RegSetKeySecurity
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
RegEnumKeyExA
RegNotifyChangeKeyValue
RegCloseKey
RegQueryValueExA
RegOpenKeyA
RegSetValueExA
RegCreateKeyA
GetUserNameA
RegCreateKeyExA
RegEnumValueA
RegQueryInfoKeyA
RegGetKeySecurity
RegQueryValueA
RegDeleteKeyA
RegDeleteValueA
RegOpenKeyExA
SHGetFolderPathA
SysAllocString
SysFreeString
SysStringLen
VariantClear
SysStringByteLen
OleCreateFontIndirect
VariantInit
LoadRegTypeLi
LoadTypeLi
DispCallFunc
VarUI4FromStr
SysAllocStringLen
Always
BEginReportInfo
PecialProcessMedia
RappShowAD
ReneralMidIE
SEStation
SEndStation
SetMediaProcessID
playAdh
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ