tBUQNDBjFNI
saewrteryutr09
w67w67
Static task
static1
Behavioral task
behavioral1
Sample
c0c419197b0ee58b57532cd3b7939380_JaffaCakes118.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
c0c419197b0ee58b57532cd3b7939380_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
c0c419197b0ee58b57532cd3b7939380_JaffaCakes118
Size
55KB
MD5
c0c419197b0ee58b57532cd3b7939380
SHA1
8b7f9a58a2dfc6ec81db39de350554a0ea6d3688
SHA256
5041e8d904411d5ecbd71a9f4760e71684b32b2dfc42f6a730fe47b1cb3612e1
SHA512
3905084c1407def349862da62361e65b1b1c84156601b0da5c645851312590813c3403c61ea79e1e51558bfb3f2e6d1dfd7e685fdb5ee2fc8df4fcc6d8f10ddf
SSDEEP
768:b9GJSBnYzcFEAACZtzeMUJgzWtLrtgkV0riWL8ZOF9r4B1MBBZhfk49mHnqulG9G:28nsyevJ4WtNWXL8cF9r4Shs4adlGaz
Checks for missing Authenticode signature.
resource |
---|
c0c419197b0ee58b57532cd3b7939380_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
OpenDesktopA
CallNextHookEx
GetForegroundWindow
UnhookWindowsHookEx
SetWindowsHookExW
GetWindowTextA
PostMessageA
PostThreadMessageA
wsprintfW
GetThreadDesktop
OpenInputDesktop
ExitWindowsEx
wsprintfA
SetCursorPos
GetWindowThreadProcessId
SendInput
SetThreadDesktop
OpenWindowStationA
SetProcessWindowStation
CloseDesktop
CloseWindowStation
CharUpperA
GetActiveWindow
GetMessageA
CreateCompatibleBitmap
CreateCompatibleDC
SelectObject
BitBlt
GetDeviceCaps
DeleteObject
CreateDCA
GetDIBits
DeleteDC
StartServiceA
AdjustTokenPrivileges
OpenThreadToken
ImpersonateSelf
RegisterServiceCtrlHandlerA
SetServiceStatus
RegCreateKeyExA
RegSetValueExA
DeleteService
CreateServiceA
OpenSCManagerA
OpenServiceA
CloseServiceHandle
LookupPrivilegeValueA
RegCloseKey
GetUserNameW
StrStrA
SHEmptyRecycleBinA
StrRChrA
ShellExecuteA
StrCmpNIA
StrChrA
SHFileOperationA
CreateStreamOnHGlobal
inet_ntoa
gethostbyname
inet_addr
recv
select
closesocket
send
setsockopt
socket
htons
connect
WSAStartup
StrToIntA
StrCmpW
GetModuleFileNameExA
ImmGetCompositionStringW
ImmReleaseContext
ImmGetCompositionStringA
ImmGetContext
_adjust_fdiv
_initterm
_onexit
__dllonexit
strrchr
malloc
wcscmp
free
strchr
_beginthread
__CxxFrameHandler
??2@YAPAXI@Z
??3@YAXPAX@Z
SearchPathA
GetModuleFileNameA
OpenProcess
CreateDirectoryA
MoveFileA
GetDriveTypeA
GetVolumeInformationA
GetDiskFreeSpaceExA
GetLogicalDriveStringsA
GetFileAttributesExA
FindClose
GetLastError
FindNextFileA
FindFirstFileA
lstrcmpA
lstrcmpiA
GetCurrentProcessId
GetProcAddress
FreeLibrary
LocalAlloc
InterlockedExchange
SetFilePointer
FlushFileBuffers
lstrlenW
lstrcatW
OpenEventA
OpenMutexA
GetFileSize
GlobalAlloc
GlobalLock
lstrcpyW
WaitForMultipleObjects
ResetEvent
ReleaseMutex
GlobalFree
CreateEventA
CreateMutexA
GetFileSizeEx
SetFilePointerEx
ReadFile
GetCurrentProcess
GetPriorityClass
GetThreadPriority
SetPriorityClass
SetThreadPriority
QueryPerformanceFrequency
QueryPerformanceCounter
GetVersion
GetVersionExA
GetSystemInfo
GlobalMemoryStatus
GetComputerNameA
RaiseException
LoadLibraryA
WideCharToMultiByte
GetACP
GetOEMCP
GetLocalTime
lstrlenA
GetTempPathA
GetCurrentThreadId
CreateFileA
WriteFile
CloseHandle
lstrcpyA
GetCurrentThread
GetSystemDirectoryA
DeleteFileA
SetEvent
GetTickCount
WaitForSingleObject
Sleep
CreateProcessA
lstrcatA
GetStartupInfoA
tBUQNDBjFNI
saewrteryutr09
w67w67
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ