EFtcmynE
KgDtJD
LjOnIHcNMR
UPnDeHXawp
uVsGcYWD
Static task
static1
Behavioral task
behavioral1
Sample
6575b1c1401ad6d1535a829df5e689b7_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
6575b1c1401ad6d1535a829df5e689b7_JaffaCakes118.dll
Resource
win10v2004-20240709-en
Target
6575b1c1401ad6d1535a829df5e689b7_JaffaCakes118
Size
38KB
MD5
6575b1c1401ad6d1535a829df5e689b7
SHA1
0631377507f137174c82016b17c2980925fe0aa4
SHA256
b26c775e943b46156b37a4f6dcee6c80757094c00c4466f50375e9777750e9cb
SHA512
501df026c83a57c83d72748df6c9893c8a3f3f37aea95a418111a2a5604b66d907de4fff35e1f722713f11221a3fef6302d9f20a7ad140a9fa5cbc8410e01f7c
SSDEEP
768:vys1lc0mPnUoSdWI/OygUeK3/CRRCba32szZOHgBm3N6:vyyCjPUoSdWpyOK3/CRRCbams1eN6
Checks for missing Authenticode signature.
resource |
---|
6575b1c1401ad6d1535a829df5e689b7_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
RaiseException
GetLastError
GetProcAddress
GetLocalTime
FindAtomA
GetModuleFileNameA
GetModuleHandleA
CreateMutexA
CloseHandle
GetVersion
GetTempPathA
GetSystemTime
lstrcpyA
GetFileSize
lstrcmpA
GetLocaleInfoA
MoveFileExA
FreeLibrary
SystemTimeToFileTime
SetEvent
VirtualFree
GetWindowsDirectoryA
GetVolumeInformationA
CreateEventA
GetSystemDirectoryA
lstrcatA
VirtualAlloc
LoadLibraryA
WritePrivateProfileStringA
MoveFileA
GetCurrentThreadId
ReleaseMutex
GetVersionExA
HeapAlloc
HeapFree
GetProcessHeap
ReadFile
GetTempFileNameA
DeleteFileA
GetThreadContext
VirtualQueryEx
GlobalAlloc
TerminateProcess
GlobalFree
ResumeThread
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
VirtualQuery
RtlUnwind
CreateProcessA
Sleep
OpenProcess
WriteFile
GetTickCount
WaitForSingleObject
lstrcpynA
lstrlenA
CreateFileA
lstrcmpiA
ExitProcess
IsDebuggerPresent
ClientToScreen
SetThreadDesktop
CloseDesktop
OpenInputDesktop
GetThreadDesktop
wsprintfA
InflateRect
SetWindowsHookExA
GetCursorPos
GetCaretPos
PostMessageA
GetWindowRect
GetFocus
FindWindowExA
EqualRect
IsWindowVisible
FindWindowA
GetWindowThreadProcessId
CallNextHookEx
CreateProcessAsUserA
RegQueryValueExA
RegDeleteKeyA
RegEnumKeyExA
RegCreateKeyExA
RegOpenKeyExA
RegDeleteValueA
RegEnumValueA
RegCloseKey
OpenProcessToken
SHDeleteKeyA
SHDeleteValueA
SHSetValueA
SHGetValueA
EFtcmynE
KgDtJD
LjOnIHcNMR
UPnDeHXawp
uVsGcYWD
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ