zJJInst
zJJRun
zJJShutdown
zJJStartup
zJJTest
Static task
static1
Behavioral task
behavioral1
Sample
d0638382701d51be199d6085a1091073_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d0638382701d51be199d6085a1091073_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
d0638382701d51be199d6085a1091073_JaffaCakes118
Size
32KB
MD5
d0638382701d51be199d6085a1091073
SHA1
9b7626fd3749ae9abc9b073c25a7b13703d6ec63
SHA256
bcc124c389b39fc84729b732b6668844f04fa0f73ead1cb79f70a7aa569f4efe
SHA512
24b422975ced1206a54e92028b5bfe365dbefe8e67113f5ee331c77ef5803de84228cea0014137cefc55eb8d11afb9b2132860751398448a0ad69bfadf28191d
SSDEEP
384:VbGGx1uFjLdZgdb4VhfjB1Rp/wQKYpScVU+FaLF7/1j8hgJ5w7zoq/daHi0qEQ5r:6/VUsaLd/1j8hg07zolCgIpRxBONbcX
Checks for missing Authenticode signature.
resource |
---|
d0638382701d51be199d6085a1091073_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
CreateProcessA
GetTempPathA
lstrlenA
GetSystemTime
lstrcpynA
lstrcatA
CreateThread
GetLastError
WaitForSingleObject
lstrcmpA
CreateEventA
GetLocaleInfoA
MoveFileExA
GetModuleHandleA
FreeLibrary
GetSystemDirectoryA
SystemTimeToFileTime
GetCurrentThreadId
GetVersionExA
SetEvent
lstrcmpiA
GetProcAddress
VirtualAlloc
lstrcpyA
VirtualFree
GetWindowsDirectoryA
CreateFileA
GetFileSize
WritePrivateProfileStringA
OpenProcess
MoveFileA
GetVolumeInformationA
ReadProcessMemory
ReadFile
VirtualProtectEx
GetTempFileNameA
HeapAlloc
DeleteFileA
HeapFree
GetProcessHeap
GetThreadContext
SetThreadContext
VirtualQueryEx
GlobalAlloc
TerminateProcess
GlobalFree
ResumeThread
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
VirtualQuery
RtlUnwind
Sleep
GetVersion
ExitProcess
CloseHandle
CreateMutexA
GetModuleFileNameA
WriteFile
FindAtomA
GetLocalTime
LoadLibraryA
GetTickCount
IsDebuggerPresent
GetThreadDesktop
SetThreadDesktop
CloseDesktop
OpenInputDesktop
FindWindowExA
FindWindowA
DispatchMessageA
GetMessageA
GetWindowThreadProcessId
CreateWindowExA
GetWindowRect
DefWindowProcA
RegisterClassExA
SetWindowsHookExA
GetCursorPos
GetFocus
EqualRect
TranslateMessage
IsWindowVisible
InflateRect
LoadCursorA
LoadIconA
GetCaretPos
CallNextHookEx
PostMessageA
wsprintfA
ClientToScreen
RegEnumValueA
RegEnumKeyExA
RegCreateKeyExA
RegOpenKeyExA
RegCloseKey
RegDeleteValueA
CreateProcessAsUserA
RegQueryValueExA
OpenProcessToken
RegDeleteKeyA
SHDeleteValueA
SHSetValueA
SHGetValueA
SHDeleteKeyA
zJJInst
zJJRun
zJJShutdown
zJJStartup
zJJTest
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ