AoYohnaARh
TONlYLy
bicAFMwjTUG
iOXWYgIrjSj
wsXBtqoFpAWf
Static task
static1
Behavioral task
behavioral1
Sample
d490e7b79d85dd95e6ac5dbb5a6b3742_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d490e7b79d85dd95e6ac5dbb5a6b3742_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
d490e7b79d85dd95e6ac5dbb5a6b3742_JaffaCakes118
Size
80KB
MD5
d490e7b79d85dd95e6ac5dbb5a6b3742
SHA1
217cbd333c1db08ba65017df151cb6ee8e528d27
SHA256
5a8135d0b382977799f0df45262855c983587593667b2e3b681eaea86310171f
SHA512
ec06308e49c946d5adc9e376d705a84620860b2e6c8b5b5b45971863a9316a74fb2f12cdc835fb9d028291bddaef8aa56cea6b71af88b79aa1f9126ab6adac2a
SSDEEP
768:tHUYwf9MXd0lXJ1AP+fJ1i4b0KRUf4BaMuDnH6rNf8mI5jpskgaQ5Ob7QwVOGGOr:tHcf+Gk60im1RVoSpFGCTEcOB7K07c
Checks for missing Authenticode signature.
resource |
---|
d490e7b79d85dd95e6ac5dbb5a6b3742_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
_except_handler3
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
RtlUnwind
SystemTimeToFileTime
SetEvent
GetVolumeInformationA
GetLocaleInfoA
GetTickCount
ReleaseMutex
MoveFileExA
GetWindowsDirectoryA
WritePrivateProfileStringA
MoveFileA
GetSystemTime
GetSystemDirectoryA
lstrcmpiA
lstrcmpA
GetVersionExA
CreateEventA
VirtualFree
ResumeThread
TerminateProcess
GlobalFree
GetThreadContext
VirtualQueryEx
LoadLibraryA
FreeLibrary
GlobalAlloc
VirtualAlloc
DeleteFileA
GetTempPathA
GetModuleFileNameA
GetLastError
CreateMutexA
lstrlenA
WaitForSingleObject
GetProcAddress
GetModuleHandleA
ExitProcess
Sleep
GetVersion
CreateProcessA
CloseHandle
WriteFile
CreateFileA
lstrcatA
lstrcpynA
lstrcpyA
GetProcessHeap
HeapFree
ReadFile
HeapAlloc
GetFileSize
OpenProcess
GetCurrentThreadId
GetTempFileNameA
GetWindowTextA
FindWindowExA
MessageBoxA
OpenInputDesktop
GetThreadDesktop
SetThreadDesktop
CloseDesktop
IsWindowVisible
GetCursorPos
InflateRect
EqualRect
DefWindowProcA
LoadIconA
LoadCursorA
RegisterClassExA
CreateWindowExA
GetMessageA
TranslateMessage
DispatchMessageA
wsprintfA
CallNextHookEx
FindWindowA
GetWindowThreadProcessId
PostMessageA
ClientToScreen
GetFocus
SetWindowsHookExA
RegDeleteKeyA
OpenProcessToken
RegCloseKey
RegOpenKeyExA
RegEnumKeyExA
RegQueryValueExA
CreateProcessAsUserA
RegEnumValueA
RegDeleteValueA
RegCreateKeyExA
SHDeleteKeyA
SHDeleteValueA
SHGetValueA
SHSetValueA
GetBkMode
GetBkColor
AoYohnaARh
TONlYLy
bicAFMwjTUG
iOXWYgIrjSj
wsXBtqoFpAWf
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ