EONGoOjGIOK
HEqCGQnHGCG
UYheBeTX
qnKcbd
sKuUxZS
Static task
static1
Behavioral task
behavioral1
Sample
756b3644415918b4352f118170a727cd_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
756b3644415918b4352f118170a727cd_JaffaCakes118.dll
Resource
win10v2004-20240709-en
Target
756b3644415918b4352f118170a727cd_JaffaCakes118
Size
62KB
MD5
756b3644415918b4352f118170a727cd
SHA1
915307e6153a987d25cde5f7dddbde8c7af6821b
SHA256
623a39416bb5ee6affd23a774e96f735bdf537435b036dac61ea16a0c164f8fc
SHA512
cee7073b84984bdc0220d64298aee7c35a9ec2a846bc49433034b365721e94e685a836647bd88a2d661721dd3025003b6d049529a87509e982f0aaa4650c399d
SSDEEP
1536:ulJWr+U/KisFWZuIyRtggiS2MaEqaAsA:uRU/KisFOPiGEaEfZA
Checks for missing Authenticode signature.
resource |
---|
756b3644415918b4352f118170a727cd_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
CreateProcessA
CloseHandle
WriteFile
CreateFileA
lstrcpynA
CreateEventA
GetVersionExA
lstrcmpA
VirtualAlloc
VirtualFree
lstrcmpiA
FreeLibrary
LoadLibraryA
GetSystemDirectoryA
GetSystemTime
MoveFileA
GetCurrentThreadId
WritePrivateProfileStringA
GetWindowsDirectoryA
MoveFileExA
GetTempPathA
ReleaseMutex
GetTickCount
GetVersion
GetVolumeInformationA
SetEvent
GetFileSize
SystemTimeToFileTime
GetProcessHeap
HeapFree
ReadFile
HeapAlloc
GetTempFileNameA
DeleteFileA
GlobalAlloc
VirtualQueryEx
GetThreadContext
GlobalFree
TerminateProcess
ResumeThread
RtlUnwind
VirtualQuery
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
Sleep
ExitProcess
WaitForSingleObject
CreateMutexA
OpenProcess
GetModuleHandleA
lstrcpyA
lstrlenA
GetProcAddress
GetLastError
lstrcatA
RaiseException
GetLocaleInfoA
GetModuleFileNameA
LoadIconA
DefWindowProcA
GetWindowTextA
CloseDesktop
SetThreadDesktop
GetThreadDesktop
OpenInputDesktop
MessageBoxA
LoadCursorA
FindWindowA
SetWindowsHookExA
PostMessageA
FindWindowExA
GetWindowThreadProcessId
GetCursorPos
EqualRect
wsprintfA
ClientToScreen
GetFocus
RegisterClassExA
CreateWindowExA
GetMessageA
TranslateMessage
CallNextHookEx
InflateRect
IsWindowVisible
DispatchMessageA
RegCloseKey
RegCreateKeyExA
RegDeleteValueA
RegEnumValueA
RegDeleteKeyA
RegQueryValueExA
RegEnumKeyExA
RegOpenKeyExA
OpenProcessToken
CreateProcessAsUserA
SHDeleteKeyA
SHDeleteValueA
SHGetValueA
SHSetValueA
GetBkColor
GetBkMode
EONGoOjGIOK
HEqCGQnHGCG
UYheBeTX
qnKcbd
sKuUxZS
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ