IhfrERKmLyv
IuqYIbhRpSAC
OtMuYu
aHUUKAH
dlcxtIS
Static task
static1
Behavioral task
behavioral1
Sample
b98b253e8c894f47bbead421336eab46_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
b98b253e8c894f47bbead421336eab46_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
b98b253e8c894f47bbead421336eab46_JaffaCakes118
Size
81KB
MD5
b98b253e8c894f47bbead421336eab46
SHA1
b2c4dd8550d50d5db83c511dbba2874fd3c3a2df
SHA256
b5509f1965696b577f88e1176bda1d74a6c3decff724827696d563d76c47f01a
SHA512
f71ce9c0a68306ffa8fc9285af018c86f1b68d52b8a3e331a19c5f36e44acd2fa166ee558976ef1803ba2f664a294ab0f4cb6bd67dc2e686068b752f1861dbe5
SSDEEP
1536:w8am0Sk6rpNLbDwL02ZNqT8+KM4fVHhlnncNZTr:em0X6lNLbn2+8+KMCnmP
Checks for missing Authenticode signature.
resource |
---|
b98b253e8c894f47bbead421336eab46_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
_except_handler3
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
RtlUnwind
SystemTimeToFileTime
SetEvent
GetVolumeInformationA
GetLocaleInfoA
GetTickCount
ReleaseMutex
MoveFileExA
GetWindowsDirectoryA
WritePrivateProfileStringA
MoveFileA
GetSystemTime
GetSystemDirectoryA
lstrcmpiA
lstrcmpA
GetVersionExA
CreateEventA
VirtualFree
ResumeThread
TerminateProcess
GlobalFree
GetThreadContext
VirtualQueryEx
LoadLibraryA
FreeLibrary
GlobalAlloc
VirtualAlloc
DeleteFileA
GetTempPathA
GetModuleFileNameA
GetLastError
CreateMutexA
WaitForSingleObject
GetProcAddress
GetModuleHandleA
ExitProcess
Sleep
GetVersion
CreateProcessA
CloseHandle
WriteFile
CreateFileA
lstrcatA
lstrcpynA
lstrlenA
lstrcpyA
GetProcessHeap
HeapFree
ReadFile
HeapAlloc
GetFileSize
OpenProcess
GetCurrentThreadId
GetTempFileNameA
GetWindowTextA
FindWindowExA
MessageBoxA
OpenInputDesktop
GetThreadDesktop
SetThreadDesktop
CloseDesktop
GetCursorPos
GetFocus
EqualRect
ClientToScreen
IsWindowVisible
InflateRect
DefWindowProcA
LoadIconA
LoadCursorA
RegisterClassExA
CreateWindowExA
GetMessageA
TranslateMessage
DispatchMessageA
CallNextHookEx
FindWindowA
SetWindowsHookExA
PostMessageA
wsprintfA
GetWindowThreadProcessId
RegDeleteKeyA
OpenProcessToken
RegCloseKey
RegOpenKeyExA
RegEnumKeyExA
RegQueryValueExA
CreateProcessAsUserA
RegEnumValueA
RegDeleteValueA
RegCreateKeyExA
SHDeleteKeyA
SHDeleteValueA
SHGetValueA
SHSetValueA
GetBkMode
GetBkColor
IhfrERKmLyv
IuqYIbhRpSAC
OtMuYu
aHUUKAH
dlcxtIS
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ