xhXInst
xhXRun
xhXShutdown
xhXStartup
xhXTest
Static task
static1
Behavioral task
behavioral1
Sample
b8525d2fb61aa53e1ee6cd1f7618de5c_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
b8525d2fb61aa53e1ee6cd1f7618de5c_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
b8525d2fb61aa53e1ee6cd1f7618de5c_JaffaCakes118
Size
32KB
MD5
b8525d2fb61aa53e1ee6cd1f7618de5c
SHA1
0cd0373bf4a359cd9495f4316b85b95912aa9e1c
SHA256
f19462d1214dd6277c90cb576e08c5b5350cde2fbcc6ddfde51d562270c0ae65
SHA512
d48643eab6db5cbd57f9a38c081d77320ad527c3286a6fb38ec8ed2a2f210036a3413b7283b49f586befb97bfd469f2aa8dfeda139779c0985c04cbb8ba2de11
SSDEEP
768:ghOPb1HQfi80RCkyzGILLkpixBOV+Zgv28iu:gAPb1wfiD5mGiqJi
Checks for missing Authenticode signature.
resource |
---|
b8525d2fb61aa53e1ee6cd1f7618de5c_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
CreateProcessA
GetTempPathA
lstrlenA
GetSystemTime
lstrcatA
lstrcpynA
CreateThread
GetLastError
WaitForSingleObject
GetFileSize
WritePrivateProfileStringA
OpenProcess
MoveFileA
GetVolumeInformationA
lstrcmpA
CreateEventA
GetLocaleInfoA
MoveFileExA
GetModuleHandleA
FreeLibrary
GetSystemDirectoryA
SystemTimeToFileTime
GetCurrentThreadId
GetVersionExA
SetEvent
lstrcmpiA
CreateFileA
VirtualAlloc
lstrcpyA
VirtualFree
GetWindowsDirectoryA
LoadLibraryA
ReadProcessMemory
ReadFile
VirtualProtectEx
GetTempFileNameA
HeapAlloc
DeleteFileA
HeapFree
GetProcessHeap
ResumeThread
GetThreadContext
SetThreadContext
VirtualQueryEx
GlobalAlloc
TerminateProcess
GlobalFree
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
VirtualQuery
RtlUnwind
GetVersion
Sleep
ExitProcess
CloseHandle
CreateMutexA
GetModuleFileNameA
WriteFile
FindAtomA
GetLocalTime
GetProcAddress
GetTickCount
IsDebuggerPresent
GetThreadDesktop
SetThreadDesktop
CloseDesktop
OpenInputDesktop
FindWindowExA
FindWindowA
DispatchMessageA
GetMessageA
GetWindowThreadProcessId
GetWindowRect
CreateWindowExA
RegisterClassExA
DefWindowProcA
SetWindowsHookExA
GetFocus
GetCursorPos
EqualRect
TranslateMessage
IsWindowVisible
InflateRect
LoadCursorA
LoadIconA
CallNextHookEx
GetCaretPos
PostMessageA
wsprintfA
ClientToScreen
OpenProcessToken
RegDeleteKeyA
RegEnumKeyExA
RegCreateKeyExA
RegOpenKeyExA
RegCloseKey
RegDeleteValueA
CreateProcessAsUserA
RegQueryValueExA
RegEnumValueA
SHSetValueA
SHGetValueA
SHDeleteKeyA
SHDeleteValueA
xhXInst
xhXRun
xhXShutdown
xhXStartup
xhXTest
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ