?aitvcugdtwqs@@YAXXZ
?cmoputfnoynb@@YAXXZ
?dxpchpcjywhu@@YAXXZ
?ftxtbfxhcsdv@@YAXXZ
?lvfipncmzmgr@@YAXXZ
?pyuxltctspfe@@YAXXZ
?qayuwobpunhy@@YAXXZ
?tngnkajpemsi@@YAXXZ
?zvwxswesuerd@@YAXXZ
crh
mza
ope
Static task
static1
Behavioral task
behavioral1
Sample
6120fc74c5a858a3e1b5faece84c292d_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
6120fc74c5a858a3e1b5faece84c292d_JaffaCakes118.dll
Resource
win10v2004-20240709-en
Target
6120fc74c5a858a3e1b5faece84c292d_JaffaCakes118
Size
570KB
MD5
6120fc74c5a858a3e1b5faece84c292d
SHA1
601f4a613e1bc9b2303d1a8e06896ca87c581aae
SHA256
9ba2e986e88ac04d51a1a7ee6952a7dc9a008e4b911c06e29f7f9195b99551c7
SHA512
ca73dc5a7d326b537670d33fe7bbd51c702e8da114241e5a125bd6f29fc0798749806b1d2af99577cf0a024d0779db9124dcb0d620ab59bd0334c42e77e1c48a
SSDEEP
12288:VILIfYdCJYgDnSexnbazaoBBoZKShqzuo:VI5KHzV8aoBBoZKShq6
Checks for missing Authenticode signature.
resource |
---|
6120fc74c5a858a3e1b5faece84c292d_JaffaCakes118 |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
lstrlenW
LocalAlloc
GetSystemDirectoryW
GetComputerNameW
ReadFile
HeapFree
WriteFile
SetFilePointer
CreateFileW
CloseHandle
HeapAlloc
GetFileSize
GetProcessHeap
MultiByteToWideChar
GetVolumeInformationW
CreateDirectoryW
SetFileTime
GetFileAttributesW
LocalFileTimeToFileTime
GetCurrentDirectoryW
SystemTimeToFileTime
TerminateProcess
OpenProcess
CreateToolhelp32Snapshot
Process32NextW
Process32FirstW
WriteConsoleW
HeapSize
SetStdHandle
MoveFileW
WinExec
lstrcpyW
CopyFileW
MoveFileExW
lstrcpyA
DeleteFileW
lstrcatW
GetLastError
Sleep
SetFileAttributesW
lstrcatA
WideCharToMultiByte
lstrlenA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
IsValidCodePage
FindNextFileA
FindFirstFileExA
FindClose
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
SetLastError
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
GetModuleHandleW
GetProcAddress
EncodePointer
DecodePointer
LCMapStringW
GetLocaleInfoW
GetStringTypeW
GetCPInfo
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
InitializeSListHead
RtlUnwind
RaiseException
InterlockedFlushSList
FreeLibrary
LoadLibraryExW
HeapReAlloc
ExitProcess
GetModuleHandleExW
GetModuleFileNameA
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetStdHandle
GetFileType
GetACP
FlushFileBuffers
GetConsoleCP
GetConsoleMode
SetFilePointerEx
CharUpperA
wsprintfA
wsprintfW
RegOpenKeyExA
RegQueryValueExW
CryptAcquireContextW
CryptCreateHash
CryptHashData
CryptGetHashParam
ConvertSidToStringSidW
LookupAccountNameW
ShellExecuteA
SHGetFolderPathW
SHFileOperationW
PathRemoveFileSpecW
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
?aitvcugdtwqs@@YAXXZ
?cmoputfnoynb@@YAXXZ
?dxpchpcjywhu@@YAXXZ
?ftxtbfxhcsdv@@YAXXZ
?lvfipncmzmgr@@YAXXZ
?pyuxltctspfe@@YAXXZ
?qayuwobpunhy@@YAXXZ
?tngnkajpemsi@@YAXXZ
?zvwxswesuerd@@YAXXZ
crh
mza
ope
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ