StartH
StopH
Behavioral task
behavioral1
Sample
d1baeb94c105a4856a8ebe811abd93c1_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d1baeb94c105a4856a8ebe811abd93c1_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
d1baeb94c105a4856a8ebe811abd93c1_JaffaCakes118
Size
129KB
MD5
d1baeb94c105a4856a8ebe811abd93c1
SHA1
afa6b301a6cd641082013e4cfa7388425cfb1c95
SHA256
affce0497ca6a47605afd35cc443cab172a0241eb866e50959fdafcfb8b703da
SHA512
ce21b5d6b57c12e49ac38f47d71dbc045cf13319bd1f58d040eda3c4269e795c62a25804b09102ce05e35e4053b01e486ac4217c4b6d0fd9c4cccf6c9daf331b
SSDEEP
1536:DCquQokCaetUruQI/SCZgysBeubb9nmJuD4ISIQCfWohOFM8MUipcuwYgl2yt:Y5xDUruf/JmxPliuMjIF74MQ99pl2yt
resource | yara_rule |
---|---|
sample | upx |
Checks for missing Authenticode signature.
resource |
---|
d1baeb94c105a4856a8ebe811abd93c1_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
WriteFile
VirtualQueryEx
VirtualQuery
UnmapViewOfFile
Sleep
SetFilePointer
OpenProcess
MapViewOfFile
LoadLibraryA
LeaveCriticalSection
InitializeCriticalSection
GetVersionExA
GetThreadLocale
GetSystemInfo
GetStringTypeExA
GetStdHandle
GetProcAddress
GetModuleHandleA
GetModuleFileNameA
GetLocaleInfoA
GetLocalTime
GetDiskFreeSpaceA
GetDateFormatA
GetCurrentProcessId
GetComputerNameA
GetCPInfo
GetACP
FormatMessageA
FindFirstFileA
FindClose
FileTimeToLocalFileTime
FileTimeToDosDateTime
EnumCalendarInfoA
EnterCriticalSection
DeleteCriticalSection
CreateThread
CreateFileMappingA
CreateFileA
CompareStringA
CloseHandle
TlsSetValue
TlsGetValue
TlsFree
TlsAlloc
LocalFree
LocalAlloc
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
VirtualFree
VirtualAlloc
LocalFree
LocalAlloc
GetVersion
GetCurrentThreadId
WideCharToMultiByte
MultiByteToWideChar
lstrlenA
lstrcpynA
LoadLibraryExA
GetThreadLocale
GetStartupInfoA
GetProcAddress
GetModuleHandleA
GetModuleFileNameA
GetLocaleInfoA
GetCommandLineA
FreeLibrary
FindFirstFileA
FindClose
ExitProcess
WriteFile
UnhandledExceptionFilter
RtlUnwind
RaiseException
GetStdHandle
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
GetPixel
SafeArrayPtrOfIndex
SafeArrayGetUBound
SafeArrayGetLBound
SafeArrayCreate
VariantChangeType
VariantCopyInd
VariantCopy
VariantClear
VariantInit
SysFreeString
SysReAllocStringLen
SysAllocStringLen
UnhookWindowsHookEx
SetWindowsHookExA
SetTimer
SendMessageA
MessageBoxA
LoadStringA
KillTimer
GetWindowTextA
GetSystemMetrics
GetParent
GetDC
GetCursorPos
GetClassNameA
GetActiveWindow
FindWindowExA
CallNextHookEx
CharNextA
CharToOemA
GetKeyboardType
LoadStringA
MessageBoxA
CharNextA
WSACleanup
WSAStartup
gethostname
gethostbyname
socket
send
recv
inet_ntoa
inet_addr
htons
connect
closesocket
StartH
StopH
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE