Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
c1f511680161b3fab745486102e8381e_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
c1f511680161b3fab745486102e8381e_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/Sibuia.dll
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/Sibuia.dll
Resource
win10v2004-20240802-en
Target
c1f511680161b3fab745486102e8381e_JaffaCakes118
Size
4.3MB
MD5
c1f511680161b3fab745486102e8381e
SHA1
bd8e304e2ac452e7df955d5d10905524f47c026a
SHA256
ec78d43e9300ebc56eb4354a9b698fc6eba40c77ca8231f440668b4a2c7b8be0
SHA512
3e0d42a09d1175e883fd2cc89076e7194d2032ad2a29917f74ece0ec4e2942dc1108c6bbf7c113b8f95151a7fbabc80ca2cf319f1c92b48e6a70ed7730cd90d7
SSDEEP
98304:vKVUJmFYJZ2pzdrGx4jONHhe/o3WqVAnq49r:vKVU8FYizxGxhHTmqVAnqyr
Checks for missing Authenticode signature.
resource |
---|
c1f511680161b3fab745486102e8381e_JaffaCakes118 |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
SetFileTime
CompareFileTime
SearchPathW
GetShortPathNameW
GetFullPathNameW
MoveFileW
SetCurrentDirectoryW
GetFileAttributesW
GetLastError
CreateDirectoryW
SetFileAttributesW
Sleep
GetTickCount
GetFileSize
GetModuleFileNameW
GetCurrentProcess
CopyFileW
ExitProcess
GetWindowsDirectoryW
GetTempPathW
GetCommandLineW
SetErrorMode
lstrcpynA
CloseHandle
lstrcpynW
GetDiskFreeSpaceW
GlobalUnlock
GlobalLock
CreateThread
LoadLibraryW
CreateProcessW
lstrcmpiA
CreateFileW
GetTempFileNameW
lstrcatW
GetProcAddress
LoadLibraryA
GetModuleHandleA
OpenProcess
lstrcpyW
GetVersionExW
GetSystemDirectoryW
GetVersion
lstrcpyA
RemoveDirectoryW
lstrcmpA
lstrcmpiW
lstrcmpW
ExpandEnvironmentStringsW
GlobalAlloc
WaitForSingleObject
GetExitCodeProcess
GlobalFree
GetModuleHandleW
LoadLibraryExW
FreeLibrary
WritePrivateProfileStringW
GetPrivateProfileStringW
WideCharToMultiByte
lstrlenA
MulDiv
WriteFile
ReadFile
MultiByteToWideChar
SetFilePointer
FindClose
FindNextFileW
FindFirstFileW
DeleteFileW
lstrlenW
GetAsyncKeyState
IsDlgButtonChecked
ScreenToClient
GetMessagePos
CallWindowProcW
IsWindowVisible
LoadBitmapW
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
TrackPopupMenu
GetWindowRect
AppendMenuW
CreatePopupMenu
GetSystemMetrics
EndDialog
EnableMenuItem
GetSystemMenu
SetClassLongW
IsWindowEnabled
SetWindowPos
DialogBoxParamW
CheckDlgButton
CreateWindowExW
SystemParametersInfoW
RegisterClassW
SetDlgItemTextW
GetDlgItemTextW
MessageBoxIndirectW
CharNextA
CharUpperW
CharPrevW
wvsprintfW
DispatchMessageW
PeekMessageW
wsprintfA
DestroyWindow
CreateDialogParamW
SetTimer
SetWindowTextW
PostQuitMessage
SetForegroundWindow
ShowWindow
wsprintfW
SendMessageTimeoutW
LoadCursorW
SetCursor
GetWindowLongW
GetSysColor
CharNextW
GetClassInfoW
ExitWindowsEx
IsWindow
GetDlgItem
SetWindowLongW
LoadImageW
GetDC
EnableWindow
InvalidateRect
SendMessageW
DefWindowProcW
BeginPaint
GetClientRect
FillRect
DrawTextW
EndPaint
FindWindowExW
SetBkColor
GetDeviceCaps
DeleteObject
CreateBrushIndirect
CreateFontIndirectW
SetBkMode
SetTextColor
SelectObject
SHBrowseForFolderW
SHGetPathFromIDListW
SHGetFileInfoW
ShellExecuteW
SHFileOperationW
SHGetSpecialFolderLocation
RegEnumKeyW
RegOpenKeyExW
RegCloseKey
RegDeleteKeyW
RegDeleteValueW
RegCreateKeyExW
RegSetValueExW
RegQueryValueExW
RegEnumValueW
ImageList_AddMasked
ImageList_Destroy
ord17
ImageList_Create
CoTaskMemFree
OleInitialize
OleUninitialize
CoCreateInstance
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
C:\Users\DevUser\source\repos\Sibl\Release\Sibuia.pdb
GetFileTime
SystemTimeToTzSpecificLocalTime
GlobalFlags
GetCurrentDirectoryW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
GetSystemTimeAsFileTime
InitializeSListHead
WriteConsoleW
ReadConsoleW
GetStringTypeW
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCPInfo
GetOEMCP
IsValidCodePage
GetFileAttributesExW
GetTimeZoneInformation
SetStdHandle
SetFilePointerEx
GetConsoleMode
GetConsoleCP
GetStdHandle
ExitProcess
GetCommandLineW
GetCommandLineA
HeapQueryInformation
GetModuleHandleExW
FreeLibraryAndExitThread
GetFileType
GetDriveTypeW
InterlockedFlushSList
RtlUnwind
MoveFileExW
FindNextFileW
RemoveDirectoryW
CreateDirectoryW
LCMapStringW
lstrlenW
OutputDebugStringW
FileTimeToLocalFileTime
FileTimeToSystemTime
ResumeThread
CreateEventW
SetErrorMode
LocalReAlloc
LocalAlloc
GlobalHandle
GlobalReAlloc
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
InitializeCriticalSection
CompareStringW
GlobalFindAtomW
GlobalAddAtomW
lstrcmpW
GlobalDeleteAtom
GetSystemDirectoryW
EncodePointer
GetCurrentProcessId
GetFileSizeEx
lstrcmpA
LoadLibraryA
LoadLibraryExW
WriteFile
UnlockFile
SetEndOfFile
LockFile
GetVolumeInformationW
GetFullPathNameW
GetFileSize
FlushFileBuffers
FindFirstFileW
FindClose
GetModuleHandleA
InitializeCriticalSectionAndSpinCount
LeaveCriticalSection
EnterCriticalSection
SetLastError
OutputDebugStringA
GetACP
DeleteCriticalSection
DecodePointer
HeapReAlloc
HeapSize
InitializeCriticalSectionEx
GlobalFree
ExitThread
LocalFree
FormatMessageW
lstrcpynW
RaiseException
GlobalUnlock
GlobalLock
GlobalAlloc
VirtualFreeEx
ReadProcessMemory
WriteProcessMemory
VirtualAllocEx
OpenProcess
MulDiv
QueryInformationJobObject
VirtualAlloc
VirtualFree
CreateThread
GetVersionExW
HeapFree
GetProcessHeap
HeapAlloc
GetCurrentThread
GetTempFileNameW
GetTempPathW
GetFileAttributesW
SetFilePointer
CreateFileW
FreeLibrary
LoadLibraryW
WideCharToMultiByte
TerminateProcess
Sleep
AssignProcessToJobObject
CreateJobObjectW
GetCurrentThreadId
ExpandEnvironmentStringsW
SetFileAttributesW
SetFileTime
CopyFileW
SetCurrentDirectoryW
MultiByteToWideChar
DuplicateHandle
GetExitCodeProcess
WaitForSingleObject
CreateProcessW
DeleteFileW
ReadFile
GetModuleHandleW
GetProcAddress
CloseHandle
GetCurrentProcess
GetModuleFileNameW
GetLastError
FindResourceW
LoadResource
LockResource
FindFirstFileExW
SizeofResource
GetMonitorInfoW
MonitorFromWindow
WinHelpW
LoadIconW
CallNextHookEx
UnhookWindowsHookEx
SetWindowsHookExW
GetTopWindow
GetClassNameW
GetClassLongW
SetWindowLongW
PtInRect
GetSysColor
MapWindowPoints
AdjustWindowRectEx
GetWindowRect
RemovePropW
GetPropW
SetPropW
RedrawWindow
ValidateRect
EndPaint
BeginPaint
SetForegroundWindow
GetForegroundWindow
SetMenu
GetMenu
GetCapture
GetKeyState
GetThreadDesktop
GetFocus
GetDlgCtrlID
IsIconic
EndDeferWindowPos
DeferWindowPos
BeginDeferWindowPos
IsMenu
IsWindow
GetClassInfoW
RegisterClassW
CallWindowProcW
GetMessageTime
GetMessagePos
PeekMessageW
DispatchMessageW
RegisterWindowMessageW
GetWindow
GetWindowTextW
GetScrollPos
GetLastActivePopup
GetWindowLongW
SetWindowTextW
GetDC
ReleaseDC
GetSysColorBrush
LoadCursorW
DrawTextW
DrawTextExW
GrayStringW
TabbedTextOutW
CreateDesktopW
SetThreadDesktop
CloseDesktop
DestroyWindow
CreateWindowExW
DefWindowProcW
ShowWindow
CopyRect
SetWindowPos
GetWindowThreadProcessId
IsWindowVisible
EnumWindows
ScreenToClient
PostMessageW
GetClientRect
SendMessageW
ClientToScreen
OpenClipboard
EmptyClipboard
SetClipboardData
CloseClipboard
MessageBoxW
FindWindowExW
SetDlgItemTextW
GetDlgItem
wsprintfW
UnregisterClassW
SetRectEmpty
OffsetRect
GetParent
RealChildWindowFromPoint
DestroyMenu
CheckMenuItem
EnableMenuItem
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
SetMenuItemInfoW
LoadBitmapW
PostQuitMessage
GetSubMenu
GetMenuItemID
GetMenuItemCount
CharUpperW
GetSystemMetrics
EnableWindow
IsWindowEnabled
GetClassInfoExW
PtVisible
RectVisible
RestoreDC
SaveDC
SelectObject
SetMapMode
TextOutW
ExtTextOutW
SetViewportExtEx
SetViewportOrgEx
SetWindowExtEx
OffsetViewportOrgEx
ScaleViewportExtEx
ScaleWindowExtEx
GetStockObject
GetClipBox
Escape
DeleteObject
CreateBitmap
SetTextColor
SetBkColor
GetDeviceCaps
DeleteDC
OpenPrinterW
DocumentPropertiesW
ClosePrinter
CopySid
GetLengthSid
GetTokenInformation
OpenThreadToken
DeregisterEventSource
ReportEventW
RegisterEventSourceW
RegUnLoadKeyW
RegLoadKeyW
RegQueryValueExW
RegEnumKeyExW
RegQueryInfoKeyW
RegOpenKeyExW
RegCloseKey
AdjustTokenPrivileges
LookupPrivilegeValueW
OpenProcessToken
SHGetFolderPathW
ord51
PathFindFileNameW
UrlUnescapeW
PathFileExistsW
PathIsUNCW
PathFindExtensionW
PathStripToRootW
PathMatchSpecW
CoUninitialize
CoCreateInstance
CoInitializeEx
CoInitialize
SysAllocString
SysFreeString
SafeArrayCreateVector
SafeArrayPutElement
VariantChangeType
VarBstrFromDate
SystemTimeToVariantTime
VariantTimeToSystemTime
SysAllocStringLen
SafeArrayDestroy
VariantClear
VariantInit
UuidToStringW
RpcStringFreeW
UuidCreate
WinHttpCloseHandle
WinHttpQueryHeaders
WinHttpReceiveResponse
WinHttpReadData
WinHttpOpenRequest
WinHttpConnect
WinHttpSetOption
WinHttpOpen
WinHttpCrackUrl
WinHttpQueryDataAvailable
WinHttpSendRequest
freeaddrinfo
connect
WSAStartup
socket
getaddrinfo
WSACleanup
closesocket
WSAGetLastError
send
CreateStdAccessibleObject
LresultFromObject
install
uninstall
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ