HjrbyFdk
MsnSMiHkhqS
UmOVzpege
VAzyYHBFgWt
jrGiBruC
Static task
static1
Behavioral task
behavioral1
Sample
a356fe098e949ebc100c5023d38b61e1_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a356fe098e949ebc100c5023d38b61e1_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
a356fe098e949ebc100c5023d38b61e1_JaffaCakes118
Size
80KB
MD5
a356fe098e949ebc100c5023d38b61e1
SHA1
44f21cf0f4b34550d7b2532b6ef15b8d882f9f40
SHA256
f6cee3c0acd3352d5f18aef745d015749dbcf1f5b63c83909ac062b1d92859c6
SHA512
fadb8b804df409bd81f2465ab47389a681ab29722b1fe0e53644d64ed95b4885fce414e94ac475bfc8d67f4ba1b11a61b4c729877ca1f999f44cf01a43534549
SSDEEP
1536:9hTaX3J628qA+pGuxTjokP/6VQGg8ML4zaJDIa+:raX3J628qA+pXX6VQ5bEaJp
Checks for missing Authenticode signature.
resource |
---|
a356fe098e949ebc100c5023d38b61e1_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
_except_handler3
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
RtlUnwind
SystemTimeToFileTime
SetEvent
GetVolumeInformationA
GetLocaleInfoA
GetTickCount
ReleaseMutex
MoveFileExA
GetWindowsDirectoryA
WritePrivateProfileStringA
MoveFileA
GetSystemTime
GetSystemDirectoryA
lstrcmpiA
lstrcmpA
GetVersionExA
CreateEventA
VirtualFree
ResumeThread
TerminateProcess
GlobalFree
GetThreadContext
VirtualQueryEx
LoadLibraryA
FreeLibrary
GlobalAlloc
VirtualAlloc
DeleteFileA
GetTempPathA
GetModuleFileNameA
GetLastError
CreateMutexA
lstrcpyA
WaitForSingleObject
GetProcAddress
GetModuleHandleA
ExitProcess
Sleep
GetVersion
CreateProcessA
CloseHandle
WriteFile
CreateFileA
lstrcatA
lstrcpynA
lstrlenA
GetProcessHeap
HeapFree
ReadFile
HeapAlloc
GetFileSize
OpenProcess
GetCurrentThreadId
GetTempFileNameA
GetWindowTextA
FindWindowExA
MessageBoxA
OpenInputDesktop
GetThreadDesktop
SetThreadDesktop
CloseDesktop
InflateRect
GetCursorPos
ClientToScreen
IsWindowVisible
EqualRect
GetFocus
DefWindowProcA
LoadIconA
LoadCursorA
RegisterClassExA
CreateWindowExA
GetMessageA
TranslateMessage
DispatchMessageA
wsprintfA
CallNextHookEx
GetWindowThreadProcessId
SetWindowsHookExA
PostMessageA
FindWindowA
RegDeleteKeyA
OpenProcessToken
RegCloseKey
RegOpenKeyExA
RegEnumKeyExA
RegQueryValueExA
CreateProcessAsUserA
RegEnumValueA
RegDeleteValueA
RegCreateKeyExA
SHDeleteKeyA
SHDeleteValueA
SHGetValueA
SHSetValueA
GetBkMode
GetBkColor
HjrbyFdk
MsnSMiHkhqS
UmOVzpege
VAzyYHBFgWt
jrGiBruC
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ