instalation
uninstalation
Static task
static1
Behavioral task
behavioral1
Sample
878892815ecdeceebda79516af3a6ff3_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
878892815ecdeceebda79516af3a6ff3_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
878892815ecdeceebda79516af3a6ff3_JaffaCakes118
Size
215KB
MD5
878892815ecdeceebda79516af3a6ff3
SHA1
e500631e981f78394dd1a48d74ccd1417d220402
SHA256
5b6b7de50cbfb6c3ef7ca404d9f2f324978097a8f2669b04f3da838fa125cd29
SHA512
2982a9c58e1b5d4e52c1c09da661848a0ccf8f60b47ebeb9beafc2d3f12e9c0d01ef3e3b31b88368bfc93495df6f387cf8fd44a468415ce43a34acc4d4090892
SSDEEP
6144:oT6eQk1PvwD8gODbvIYOhqcSFqqDGVka+:ovPvwD2DbI/hPSoqSy
Checks for missing Authenticode signature.
resource |
---|
878892815ecdeceebda79516af3a6ff3_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
SysFreeString
SysReAllocStringLen
SysAllocStringLen
SafeArrayPtrOfIndex
SafeArrayGetUBound
SafeArrayGetLBound
SafeArrayCreate
VariantChangeType
VariantCopy
VariantClear
VariantInit
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
SetSecurityDescriptorDacl
RegSetValueExW
RegSetValueExA
RegQueryValueExA
RegOpenKeyExA
RegEnumKeyA
RegDeleteKeyA
RegCreateKeyExA
RegCloseKey
OpenProcessToken
LookupPrivilegeValueA
IsValidSid
InitializeSecurityDescriptor
GetTokenInformation
GetLengthSid
FreeSid
EqualSid
AllocateAndInitializeSid
AdjustTokenPrivileges
GetKernelObjectSecurity
GetKeyboardType
DestroyWindow
LoadStringA
MessageBoxA
CharNextA
OpenInputDesktop
MessageBoxA
LoadStringA
GetUserObjectInformationA
GetThreadDesktop
GetSystemMetrics
CloseDesktop
CharNextA
CharToOemA
GetACP
Sleep
VirtualFree
VirtualAlloc
GetCurrentThreadId
InterlockedDecrement
InterlockedIncrement
VirtualQuery
WideCharToMultiByte
MultiByteToWideChar
lstrlenA
lstrcpynA
LoadLibraryExA
GetThreadLocale
GetStartupInfoA
GetProcAddress
GetModuleHandleA
GetModuleFileNameA
GetLocaleInfoA
GetCommandLineA
FreeLibrary
FindFirstFileA
FindClose
ExitProcess
WriteFile
UnhandledExceptionFilter
RtlUnwind
RaiseException
GetStdHandle
TlsSetValue
TlsGetValue
TlsFree
TlsAlloc
LocalFree
LocalAlloc
lstrlenW
lstrlenA
lstrcpyW
lstrcpyA
lstrcmpiW
lstrcmpiA
lstrcmpA
lstrcatW
WriteProcessMemory
WritePrivateProfileStringA
WriteFile
WaitForSingleObject
WaitForMultipleObjects
VirtualQueryEx
VirtualQuery
VirtualProtectEx
VirtualProtect
VirtualFree
VirtualAlloc
UnmapViewOfFile
Sleep
SetThreadPriority
SetLastError
SetFilePointer
SetEvent
SetEndOfFile
ResetEvent
ReleaseMutex
ReadProcessMemory
ReadFile
OpenProcess
OpenMutexW
OpenMutexA
OpenFileMappingW
OpenFileMappingA
OpenEventA
MapViewOfFile
LocalFree
LocalAlloc
LoadLibraryExA
LoadLibraryW
LoadLibraryA
LeaveCriticalSection
IsBadReadPtr
InitializeCriticalSection
GetVersionExW
GetVersionExA
GetVersion
GetTickCount
GetThreadLocale
GetThreadContext
GetTempPathW
GetSystemDirectoryW
GetSystemDirectoryA
GetStdHandle
GetProcAddress
GetPrivateProfileStringA
GetModuleHandleW
GetModuleHandleA
GetModuleFileNameW
GetModuleFileNameA
GetLocaleInfoA
GetLocalTime
GetLastError
GetFullPathNameA
GetFileSize
GetFileAttributesW
GetFileAttributesA
GetExitCodeThread
GetDiskFreeSpaceA
GetDateFormatA
GetCurrentThreadId
GetCurrentThread
GetCurrentProcessId
GetCurrentProcess
GetCurrentDirectoryW
GetCurrentDirectoryA
GetCPInfo
InterlockedExchange
FreeLibrary
FormatMessageA
EnumCalendarInfoA
EnterCriticalSection
DuplicateHandle
DeleteFileW
DeleteCriticalSection
CreateMutexW
CreateMutexA
CreateFileMappingW
CreateFileMappingA
CreateFileW
CreateFileA
CreateEventA
CompareStringA
CloseHandle
Sleep
ntohs
getpeername
instalation
uninstalation
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ