POAfe
RtOAKiOxnf
hBMpVWlM
rJkUpkYmGR
vEETKgCO
Static task
static1
Behavioral task
behavioral1
Sample
b7ec3e47833dbfa6da2c9fd251a632a8_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
b7ec3e47833dbfa6da2c9fd251a632a8_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
b7ec3e47833dbfa6da2c9fd251a632a8_JaffaCakes118
Size
39KB
MD5
b7ec3e47833dbfa6da2c9fd251a632a8
SHA1
9b99e59445bce195593d900e7edb6f4396cde678
SHA256
9b123ea4b99e16c9b5e3ec6e1feddb05785abad1544585d8b38fbf4b84d707e4
SHA512
7409b67e12f4b76704d5683134a2cddda7a24b1bf2a97ba528cd6080d3b8858ce61381213a2f1007eb1165e3ccc3f2c79180f1c8be19d6e21e97d6225656c461
SSDEEP
768:ZdR6UY275arnR4nif3kBuwCULjx5ip+238g2g6YXBm9zfy:/J75fiUDLiT12A6f
Checks for missing Authenticode signature.
resource |
---|
b7ec3e47833dbfa6da2c9fd251a632a8_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetProcAddress
GetLocalTime
FindAtomA
GetModuleFileNameA
GetModuleHandleA
CreateMutexA
CloseHandle
GetVersion
GetTempPathA
GetSystemTime
GetFileSize
lstrcmpA
GetLocaleInfoA
MoveFileExA
FreeLibrary
SystemTimeToFileTime
SetEvent
VirtualFree
GetWindowsDirectoryA
OpenProcess
GetVolumeInformationA
CreateEventA
GetSystemDirectoryA
lstrcmpiA
GetLastError
LoadLibraryA
WritePrivateProfileStringA
MoveFileA
GetCurrentThreadId
GetVersionExA
lstrcpyA
HeapAlloc
HeapFree
GetProcessHeap
ReadFile
GetTempFileNameA
DeleteFileA
GetThreadContext
VirtualQueryEx
GlobalAlloc
TerminateProcess
GlobalFree
ResumeThread
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
VirtualQuery
RtlUnwind
lstrcatA
CreateProcessA
Sleep
WriteFile
GetTickCount
WaitForSingleObject
lstrcpynA
lstrlenA
CreateFileA
VirtualAlloc
ExitProcess
IsDebuggerPresent
SetThreadDesktop
CloseDesktop
OpenInputDesktop
GetThreadDesktop
FindWindowExA
CallNextHookEx
ClientToScreen
TranslateMessage
InflateRect
CreateWindowExA
DefWindowProcA
SetWindowsHookExA
GetCursorPos
GetCaretPos
PostMessageA
DispatchMessageA
GetMessageA
GetWindowRect
RegisterClassExA
GetFocus
wsprintfA
EqualRect
IsWindowVisible
FindWindowA
LoadCursorA
GetWindowThreadProcessId
LoadIconA
CreateProcessAsUserA
RegQueryValueExA
RegDeleteKeyA
RegEnumKeyExA
RegCreateKeyExA
RegOpenKeyExA
RegDeleteValueA
RegEnumValueA
RegCloseKey
OpenProcessToken
SHDeleteKeyA
SHDeleteValueA
SHSetValueA
SHGetValueA
POAfe
RtOAKiOxnf
hBMpVWlM
rJkUpkYmGR
vEETKgCO
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ