ALEYsoT
CvVHOvIBo
ZXiVlI
jdppQz
tOqKaa
Static task
static1
Behavioral task
behavioral1
Sample
957b98a95457f0c800d925817f0ef934_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
957b98a95457f0c800d925817f0ef934_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
957b98a95457f0c800d925817f0ef934_JaffaCakes118
Size
80KB
MD5
957b98a95457f0c800d925817f0ef934
SHA1
be889d8e430ecf0dec47a1bb1c08ff2013ff1cef
SHA256
2edc1e369252c86b46558d9c4aa4e46f97b1cc3244f349989493a1a8cdd17224
SHA512
dd75e339fd174f96c0b0291d47f1aec8923d2b84df6c4186b8ec9879270c44ae7392d69c21b4365f34268de6d506d753bedf470784aa3a6338f814d18cf130d9
SSDEEP
768:fd0ozYkvHTCY4JAdqnp3YagWMAvw6fJhY5lt8vq2I2piMWP7y1Fs2l8/g/YujWQU:fd0A/bt8vqB5zyASzzupDC88
Checks for missing Authenticode signature.
resource |
---|
957b98a95457f0c800d925817f0ef934_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
_except_handler3
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
RtlUnwind
SystemTimeToFileTime
SetEvent
GetVolumeInformationA
GetLocaleInfoA
GetTickCount
ReleaseMutex
MoveFileExA
GetWindowsDirectoryA
WritePrivateProfileStringA
MoveFileA
GetSystemTime
GetSystemDirectoryA
lstrcmpiA
lstrcmpA
GetVersionExA
CreateEventA
VirtualFree
ResumeThread
TerminateProcess
GlobalFree
GetThreadContext
VirtualQueryEx
LoadLibraryA
FreeLibrary
GlobalAlloc
VirtualAlloc
DeleteFileA
GetTempPathA
GetModuleFileNameA
GetLastError
CreateMutexA
lstrcatA
lstrcpyA
WaitForSingleObject
GetProcAddress
GetModuleHandleA
ExitProcess
Sleep
GetVersion
CreateProcessA
CloseHandle
WriteFile
CreateFileA
lstrcpynA
lstrlenA
GetProcessHeap
HeapFree
ReadFile
HeapAlloc
GetFileSize
OpenProcess
GetCurrentThreadId
GetTempFileNameA
GetWindowTextA
FindWindowExA
MessageBoxA
OpenInputDesktop
GetThreadDesktop
SetThreadDesktop
CloseDesktop
ClientToScreen
GetCursorPos
InflateRect
IsWindowVisible
EqualRect
GetFocus
DefWindowProcA
LoadIconA
LoadCursorA
RegisterClassExA
CreateWindowExA
GetMessageA
TranslateMessage
DispatchMessageA
CallNextHookEx
FindWindowA
SetWindowsHookExA
PostMessageA
wsprintfA
GetWindowThreadProcessId
RegDeleteKeyA
OpenProcessToken
RegCloseKey
RegOpenKeyExA
RegEnumKeyExA
RegQueryValueExA
CreateProcessAsUserA
RegEnumValueA
RegDeleteValueA
RegCreateKeyExA
SHDeleteKeyA
SHDeleteValueA
SHGetValueA
SHSetValueA
GetBkMode
GetBkColor
ALEYsoT
CvVHOvIBo
ZXiVlI
jdppQz
tOqKaa
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ