QiEtNAQrzz
dDqXCjkXgt
jmYFALoGuhoB
mpNNmiqVRnGb
uKIlWZWXLyw
Static task
static1
Behavioral task
behavioral1
Sample
84c7c7779e9784b45a81438a27630273_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
84c7c7779e9784b45a81438a27630273_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
84c7c7779e9784b45a81438a27630273_JaffaCakes118
Size
80KB
MD5
84c7c7779e9784b45a81438a27630273
SHA1
dd1ba64fa9c9b7961d0901643aa8c0cf75fa9eee
SHA256
4382e441b61c16a16b28190c0d2c12b06931fd2c4e77d45c5171cf7e132a5caa
SHA512
e836f23d15a14b55569209edd9e241bf97c5ebabedf966f44017177df967c985c4f7be36ecc35d801e3a12770a964f1c2e198fff9c41d2a282b0f97281afd315
SSDEEP
1536:z29tV05LF3/3E6bhsXOO3WMsLLaz23r5csf7uob:eDCB386bqXrWnu239HSo
Checks for missing Authenticode signature.
resource |
---|
84c7c7779e9784b45a81438a27630273_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
_except_handler3
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
RtlUnwind
SystemTimeToFileTime
SetEvent
GetVolumeInformationA
GetLocaleInfoA
GetTickCount
ReleaseMutex
MoveFileExA
GetWindowsDirectoryA
WritePrivateProfileStringA
MoveFileA
GetSystemTime
GetSystemDirectoryA
lstrcmpiA
lstrcmpA
GetVersionExA
CreateEventA
VirtualFree
ResumeThread
TerminateProcess
GlobalFree
GetThreadContext
VirtualQueryEx
LoadLibraryA
FreeLibrary
GlobalAlloc
VirtualAlloc
DeleteFileA
GetTempPathA
GetModuleFileNameA
GetLastError
CreateMutexA
lstrlenA
lstrcpyA
WaitForSingleObject
GetProcAddress
GetModuleHandleA
ExitProcess
Sleep
GetVersion
CreateProcessA
CloseHandle
WriteFile
CreateFileA
lstrcatA
lstrcpynA
GetProcessHeap
HeapFree
ReadFile
HeapAlloc
GetFileSize
OpenProcess
GetCurrentThreadId
GetTempFileNameA
GetWindowTextA
FindWindowExA
MessageBoxA
OpenInputDesktop
GetThreadDesktop
SetThreadDesktop
CloseDesktop
EqualRect
GetFocus
ClientToScreen
IsWindowVisible
GetCursorPos
InflateRect
DefWindowProcA
LoadIconA
LoadCursorA
RegisterClassExA
CreateWindowExA
GetMessageA
TranslateMessage
DispatchMessageA
wsprintfA
CallNextHookEx
GetWindowThreadProcessId
SetWindowsHookExA
PostMessageA
FindWindowA
RegDeleteKeyA
OpenProcessToken
RegCloseKey
RegOpenKeyExA
RegEnumKeyExA
RegQueryValueExA
CreateProcessAsUserA
RegEnumValueA
RegDeleteValueA
RegCreateKeyExA
SHDeleteKeyA
SHDeleteValueA
SHGetValueA
SHSetValueA
GetBkColor
GetBkMode
QiEtNAQrzz
dDqXCjkXgt
jmYFALoGuhoB
mpNNmiqVRnGb
uKIlWZWXLyw
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ