BeginGxdaupds
Dstgmmqb
Omoeuilir
Static task
static1
Behavioral task
behavioral1
Sample
7806efb7141a39d8565d30f1b47621d1_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
7806efb7141a39d8565d30f1b47621d1_JaffaCakes118.dll
Resource
win10v2004-20240709-en
Target
7806efb7141a39d8565d30f1b47621d1_JaffaCakes118
Size
72KB
MD5
7806efb7141a39d8565d30f1b47621d1
SHA1
202e96391156d778b404d2cb192f657bb39d502d
SHA256
5b9655ba925b39a9496aea107a459f974c091f2d78e6d4fe0774d8a5edcad20a
SHA512
a4e656753a4b1a6048f695f978470c59a141c8edc07159c3e7b46a784e76aba696b209f9ee3a36879fb12c92857591f8f030e5537236e0ffe897c9784d74ae1c
SSDEEP
1536:fwnFNe3Vy+Rlso1BYpBdd/G8nz5/WtMdNl6rjPgF2:gFyy+w6Kb28nzV9z2jPgF
Checks for missing Authenticode signature.
resource |
---|
7806efb7141a39d8565d30f1b47621d1_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetNumberOfConsoleMouseButtons
VirtualFree
Process32Next
DeleteTimerQueue
WriteConsoleOutputA
GetFileAttributesExA
GlobalFlags
SetConsoleInputExeNameA
SetConsoleWindowInfo
IsProcessorFeaturePresent
GetDllDirectoryA
ReplaceFileA
FindNextVolumeMountPointA
DeleteTimerQueueEx
EnumResourceTypesA
GetConsoleFontInfo
OpenJobObjectA
lstrcmpi
WriteConsoleInputA
IsDebuggerPresent
GetCurrentThread
lstrcatA
GetConsoleAliasExesLengthW
OpenSemaphoreA
AddConsoleAliasA
UpdateResourceA
UpdateResourceA
GetNamedPipeHandleStateA
GetSystemWindowsDirectoryA
LoadLibraryExA
lstrcpyA
GetCPInfo
GetCurrentConsoleFont
SetVolumeMountPointA
CompareFileTime
GetFileSizeEx
SetLocaleInfoA
SetConsoleTitleA
ReadConsoleInputA
lstrcpynA
LockResource
SetEvent
Toolhelp32ReadProcessMemory
ReleaseMutex
GetQueuedCompletionStatus
SetPriorityClass
lstrcmpA
GetCompressedFileSizeA
GetVersionExA
WriteFile
FlushConsoleInputBuffer
SetConsoleTextAttribute
WriteProfileSectionA
GetLogicalDrives
SetDefaultCommConfigA
GetCommProperties
RemoveDirectoryA
CreateWaitableTimerA
FindNextFileA
Heap32First
GetCommModemStatus
GetCurrentProcessId
QueueUserWorkItem
GetWindowsDirectoryA
ReadConsoleOutputCharacterA
WriteConsoleOutputAttribute
GetModuleFileNameA
ExpungeConsoleCommandHistoryA
GlobalMemoryStatusEx
GetModuleHandleA
ReadConsoleOutputA
GetFullPathNameA
SetInformationJobObject
GetSystemDefaultUILanguage
HeapSize
DisconnectNamedPipe
Heap32ListFirst
GetConsoleInputExeNameA
GetProfileStringA
_lwrite
GlobalUnfix
TerminateThread
VirtualAllocEx
CreateMutexA
GetLogicalDriveStringsA
HeapWalk
timeGetSystemTime
CreateCaret
GetMenuItemInfoA
EnableMenuItem
EnumChildWindows
GetWindowLongA
ToUnicode
GetMonitorInfoA
SystemParametersInfoA
GetMessageTime
EnumChildWindows
GetAppCompatFlags
GetUpdateRgn
CallWindowProcA
SwapMouseButton
AlignRects
TrackPopupMenu
GetAsyncKeyState
AdjustWindowRectEx
DestroyWindow
GetInputState
EnumDisplaySettingsExA
SetWindowRgn
CharToOemBuffW
SetScrollInfo
SetKeyboardState
UnhookWindowsHook
AllowSetForegroundWindow
GetMessagePos
IsCharUpperA
MessageBoxExA
DestroyMenu
ChangeDisplaySettingsExW
GetUserObjectSecurity
CopyAcceleratorTableA
GetMonitorInfoA
SetRect
GetWindowRect
LoadMenuIndirectA
EnumDisplaySettingsExA
SetCaretBlinkTime
LoadAcceleratorsA
GetRawInputDeviceInfoA
GetWindowTextLengthA
IsServerSideWindow
GetDlgItem
SetProgmanWindow
GetProgmanWindow
SetWindowLongA
PostMessageA
TranslateMessageEx
ToUnicodeEx
DrawTextExA
LoadKeyboardLayoutEx
InflateRect
RegisterTasklist
CreateWindowStationW
LoadCursorFromFileW
UnlockWindowStation
AnyPopup
OpenDesktopA
GetKeyboardType
GetWindowTextA
EnumWindowStationsA
EditWndProc
GetFocus
EnableMenuItem
BeginDeferWindowPos
LoadIconA
GetActiveWindow
IsWindowVisible
KillTimer
ImpersonateDdeClientWindow
IsWindow
FlashWindowEx
IsDialogMessageA
DlgDirListComboBoxW
MapVirtualKeyA
LoadBitmapA
LoadCursorFromFileA
ArrangeIconicWindows
CreateIconIndirect
GetClipboardData
EnumWindowStationsA
DestroyWindow
BeginGxdaupds
Dstgmmqb
Omoeuilir
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ