GAfOQx
NHytHHd
RRlLUWlX
WfzsBkQxXr
ZOjwJGWVPXul
Static task
static1
Behavioral task
behavioral1
Sample
947c3b58064ffacf3d0b15aef1851612_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
947c3b58064ffacf3d0b15aef1851612_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
947c3b58064ffacf3d0b15aef1851612_JaffaCakes118
Size
80KB
MD5
947c3b58064ffacf3d0b15aef1851612
SHA1
23d66ec069a77db3238d1267ab4d80f2a3022234
SHA256
1392edf7bb432d0ba31666a2c6c565d14162bd94cf8dddd52c438c47cb9c3d67
SHA512
875b4b96ce4cb2e5d3d3e6f44cc8ec77fa645647bfd99a24726f2b6253c20c109ce41b5e089d8dbe049369d8c831f7277f50a7126f80d8239109875564296ea3
SSDEEP
1536:0q5afFYApBwqXxC1y6U1I6UtTXNBXXarqFRCQCNutFUZnLYHIVJ1FhDiYxlqwd8m:bk9pVXxC1dU1I6mXPX6mPdFSMWfFhRxb
Checks for missing Authenticode signature.
resource |
---|
947c3b58064ffacf3d0b15aef1851612_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
_except_handler3
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
RtlUnwind
SystemTimeToFileTime
SetEvent
GetVolumeInformationA
GetLocaleInfoA
GetTickCount
ReleaseMutex
MoveFileExA
GetWindowsDirectoryA
WritePrivateProfileStringA
MoveFileA
GetSystemTime
GetSystemDirectoryA
lstrcmpiA
lstrcmpA
GetVersionExA
CreateEventA
VirtualFree
ResumeThread
TerminateProcess
GlobalFree
GetThreadContext
VirtualQueryEx
LoadLibraryA
FreeLibrary
GlobalAlloc
VirtualAlloc
DeleteFileA
GetTempPathA
GetModuleFileNameA
GetLastError
CreateMutexA
lstrcatA
lstrcpyA
WaitForSingleObject
GetProcAddress
GetModuleHandleA
ExitProcess
Sleep
GetVersion
CreateProcessA
CloseHandle
WriteFile
CreateFileA
lstrcpynA
lstrlenA
GetProcessHeap
HeapFree
ReadFile
HeapAlloc
GetFileSize
OpenProcess
GetCurrentThreadId
GetTempFileNameA
GetWindowTextA
FindWindowExA
MessageBoxA
OpenInputDesktop
GetThreadDesktop
SetThreadDesktop
CloseDesktop
EqualRect
GetCursorPos
GetFocus
InflateRect
ClientToScreen
IsWindowVisible
DefWindowProcA
LoadIconA
LoadCursorA
RegisterClassExA
CreateWindowExA
GetMessageA
TranslateMessage
DispatchMessageA
wsprintfA
CallNextHookEx
GetWindowThreadProcessId
SetWindowsHookExA
PostMessageA
FindWindowA
RegDeleteKeyA
OpenProcessToken
RegCloseKey
RegOpenKeyExA
RegEnumKeyExA
RegQueryValueExA
CreateProcessAsUserA
RegEnumValueA
RegDeleteValueA
RegCreateKeyExA
SHDeleteKeyA
SHDeleteValueA
SHGetValueA
SHSetValueA
GetBkColor
GetBkMode
GAfOQx
NHytHHd
RRlLUWlX
WfzsBkQxXr
ZOjwJGWVPXul
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ