Fantasy
Kingstone
Static task
static1
Behavioral task
behavioral1
Sample
b8facde9d6f8e35bfa3417a7ec2c7fa8_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
b8facde9d6f8e35bfa3417a7ec2c7fa8_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
b8facde9d6f8e35bfa3417a7ec2c7fa8_JaffaCakes118
Size
47KB
MD5
b8facde9d6f8e35bfa3417a7ec2c7fa8
SHA1
06575ab2f6bf0d82dd74ba438148f8490d4441f0
SHA256
3fd86387a40971abd524061cecd51dcf35892f8a391fc8acd84be1c6bcc1e385
SHA512
150ddf7d30548a3500c4eeb1bdb979c4dc44cb2df03766a12ab4354228176d93e04201bb0170d8443bc2195fdcf110d617ad3c62fd5182274ec2c8e0033a6804
SSDEEP
768:LbkPSSUOrrEMOrky6XkNt1bZ2ucwCWl1MwxqsXBJyvJbIXSSSSSSSSSr:Pk7+ktKHbZ2a9uaQ
Checks for missing Authenticode signature.
resource |
---|
b8facde9d6f8e35bfa3417a7ec2c7fa8_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
VirtualFree
ReadFile
GetTickCount
VirtualAlloc
GetFileSize
CreateFileA
Sleep
GetModuleHandleA
GetProcAddress
ExitProcess
GetCurrentProcessId
GetModuleFileNameA
CopyFileA
WaitForMultipleObjects
GetDriveTypeA
GetLogicalDriveStringsA
WriteFile
SetFilePointer
WideCharToMultiByte
WritePrivateProfileStringA
GetPrivateProfileStringA
CreateProcessA
GetSystemDirectoryA
CreateThread
TerminateThread
LeaveCriticalSection
GetPrivateProfileIntA
EnterCriticalSection
CloseHandle
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
SetLastError
GetLastError
LoadLibraryA
GlobalFree
GlobalLock
MultiByteToWideChar
GlobalAlloc
GlobalUnlock
GlobalSize
GetCurrentProcess
ResumeThread
SuspendThread
InterlockedIncrement
InitializeCriticalSection
IsBadReadPtr
GetClassNameA
ToAscii
GetKeyboardState
GetWindowThreadProcessId
RegisterWindowMessageA
SendMessageTimeoutA
WindowFromPoint
GetCursorPos
CreateDCA
OleInitialize
atol
_strlwr
_strcmpi
rand
malloc
wcscmp
wcslen
realloc
free
strrchr
sprintf
__CxxFrameHandler
strstr
strcat
_except_handler3
memcpy
strlen
memset
strcpy
_ltoa
strchr
ObjectFromLresult
Fantasy
Kingstone
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ