__BXNOZWXW
WLLock
WLStartup
WLUnlock
Static task
static1
Behavioral task
behavioral1
Sample
b71681296871f06e38184d42f6138f33_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b71681296871f06e38184d42f6138f33_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
b71681296871f06e38184d42f6138f33_JaffaCakes118
Size
166KB
MD5
b71681296871f06e38184d42f6138f33
SHA1
f5fe7fc873fbe89df967a67cf78e953f65baa04e
SHA256
235d50259372f7c53c7b5500efd19e506192f1e0ba702d5c320e2c05213f465f
SHA512
7af133bb7bf664be2f6ee19e5d193a87205306f135f4f4f668c0369818a9ef0903937af9540a53a2dd5bf51a16328f36a155e26985215bbd5c12e1b544bf9ef9
SSDEEP
3072:IGUmn+79jdoJ51BsV0PHn60uawFMRswKFev9gEkIAyZ8uYLADHbsz:IGU3Rdoj1BRn6twK8kIbZvUib
Checks for missing Authenticode signature.
resource |
---|
b71681296871f06e38184d42f6138f33_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
SysFreeString
SysReAllocStringLen
SysAllocStringLen
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
SetSecurityDescriptorDacl
ReportEventW
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
OpenProcessToken
OpenEventLogW
LookupPrivilegeValueA
InitializeSecurityDescriptor
GetTokenInformation
GetLengthSid
FreeSid
CloseEventLog
AllocateAndInitializeSid
AdjustTokenPrivileges
GetKernelObjectSecurity
GetKeyboardType
DestroyWindow
MessageBoxA
CreateWindowExA
wvsprintfA
WindowFromPoint
UnhookWinEvent
UnhookWindowsHookEx
TranslateMessage
SetWinEventHook
SetWindowsHookExW
SetWindowLongW
SetWindowLongA
SetTimer
SendMessageW
SendMessageA
RegisterClassExA
PeekMessageA
MsgWaitForMultipleObjects
KillTimer
IsWindowVisible
IsWindowUnicode
IsWindow
GetWindowThreadProcessId
GetWindowTextW
GetWindowRect
GetWindowLongW
GetWindowLongA
GetSystemMetrics
GetParent
GetKeyboardState
GetKeyboardLayout
GetKeyNameTextW
GetForegroundWindow
GetFocus
GetClipboardData
GetClassNameW
GetClassInfoA
GetActiveWindow
FindWindowExW
FindWindowW
EnumChildWindows
DispatchMessageA
DestroyWindow
CallWindowProcA
CallNextHookEx
ToUnicodeEx
GetACP
Sleep
VirtualFree
VirtualAlloc
GetCurrentThreadId
VirtualQuery
WideCharToMultiByte
MultiByteToWideChar
GetStartupInfoA
GetCommandLineA
FreeLibrary
ExitProcess
WriteFile
UnhandledExceptionFilter
RtlUnwind
RaiseException
GetStdHandle
TlsSetValue
TlsGetValue
TlsFree
TlsAlloc
LocalFree
LocalAlloc
lstrlenW
lstrlenA
lstrcmpiW
lstrcmpW
lstrcmpA
lstrcatW
lstrcatA
WriteFile
WaitForSingleObject
WaitForMultipleObjects
VirtualQuery
VirtualProtect
VirtualFree
VirtualAlloc
UnmapViewOfFile
TerminateThread
Sleep
SetThreadPriority
SetLastError
SetEvent
ResetEvent
ReleaseMutex
OpenProcess
OpenMutexA
OpenFileMappingW
OpenFileMappingA
OpenEventW
OpenEventA
MapViewOfFile
LocalFree
LocalAlloc
LoadLibraryExA
LoadLibraryW
LoadLibraryA
LeaveCriticalSection
IsBadReadPtr
InitializeCriticalSection
GlobalUnlock
GlobalSize
GlobalLock
GlobalFree
GlobalAlloc
GetVersionExW
GetVersionExA
GetVersion
GetThreadContext
GetSystemDirectoryW
GetProcAddress
GetModuleHandleW
GetModuleHandleA
GetModuleFileNameW
GetModuleFileNameA
GetLastError
GetExitCodeThread
GetDriveTypeA
GetCurrentThreadId
GetCurrentThread
GetCurrentProcessId
GetCurrentProcess
FreeLibrary
FormatMessageW
FormatMessageA
FlushViewOfFile
ExitThread
EnterCriticalSection
DuplicateHandle
DisableThreadLibraryCalls
DeleteCriticalSection
CreateThread
CreateMutexW
CreateMutexA
CreateFileMappingW
CreateFileMappingA
CreateFileW
CreateFileA
CreateEventW
CreateEventA
CloseHandle
VerQueryValueW
GetFileVersionInfoSizeW
GetFileVersionInfoW
NtQueryInformationFile
__BXNOZWXW
WLLock
WLStartup
WLUnlock
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ