DqHPsnFNa
MMOWrdNZmHtLKhRLdhZD
UJKyGCiS
cqQcmN
peFfubFDNhOusc
rVvuqRmZNog
Static task
static1
Behavioral task
behavioral1
Sample
d5af66be9d3bf4c8c184e9a510ca57ba_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d5af66be9d3bf4c8c184e9a510ca57ba_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
d5af66be9d3bf4c8c184e9a510ca57ba_JaffaCakes118
Size
2.6MB
MD5
d5af66be9d3bf4c8c184e9a510ca57ba
SHA1
5e3bd30789f2c1592b146e9b6e69a5b39b0ec40e
SHA256
183c7b8de6e8041d10f0bc85dac957299065e3ace9ee3cfcd651bd28a9bd163b
SHA512
854e6da3e2c94a012feb8a51935265dd21d08b23b94ddc28eb3b8f609a8706b2511b1aea5e13094f79cee178e8c458e7a912ff48901dfe4461c6edcb9fe48ef2
SSDEEP
49152:aBAFA5hGD45PLaVaC5DRkaC+GJWQoFCC4L+5h:PFShncaC1R1CLWQeCC4
Checks for missing Authenticode signature.
resource |
---|
d5af66be9d3bf4c8c184e9a510ca57ba_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
IMAGE_FILE_DLL
AllocateAndInitializeSid
ConvertSidToStringSidA
ConvertStringSecurityDescriptorToSecurityDescriptorA
FreeSid
GetSecurityDescriptorSacl
GetSecurityInfo
GetTokenInformation
InitializeSecurityDescriptor
OpenProcessToken
SetEntriesInAclA
SetFileSecurityA
SetSecurityDescriptorDacl
SetSecurityInfo
AddVectoredExceptionHandler
CloseHandle
CreateEventA
CreateFileMappingA
CreateMutexA
CreateProcessA
CreateSemaphoreA
CreateThread
DeleteCriticalSection
DeleteFileA
DuplicateHandle
EnterCriticalSection
FindClose
FindFirstFileA
FindNextFileA
FreeLibrary
GetCurrentDirectoryA
GetCurrentProcess
GetCurrentProcessId
GetCurrentThread
GetCurrentThreadId
GetHandleInformation
GetLastError
GetModuleFileNameA
GetModuleFileNameW
GetModuleHandleA
GetModuleHandleW
GetProcAddress
GetProcessAffinityMask
GetSystemDirectoryA
GetSystemTimeAsFileTime
GetTempFileNameA
GetTempPathA
GetThreadContext
GetThreadPriority
GetTickCount
GetVersionExA
GetWindowsDirectoryA
GlobalMemoryStatus
InitializeCriticalSection
IsDBCSLeadByteEx
IsDebuggerPresent
LeaveCriticalSection
LoadLibraryA
LocalAlloc
LocalFree
MapViewOfFile
MultiByteToWideChar
OpenFileMappingA
OutputDebugStringA
QueryPerformanceCounter
RaiseException
ReleaseMutex
ReleaseSemaphore
RemoveVectoredExceptionHandler
ResetEvent
ResumeThread
SetEvent
SetLastError
SetProcessAffinityMask
SetThreadContext
SetThreadPriority
SetUnhandledExceptionFilter
Sleep
SuspendThread
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TryEnterCriticalSection
UnhandledExceptionFilter
UnmapViewOfFile
VirtualProtect
VirtualQuery
WaitForMultipleObjects
WaitForSingleObject
WideCharToMultiByte
__dllonexit
__mb_cur_max
_amsg_exit
_beginthreadex
_endthreadex
_errno
_fdopen
_fileno
_fstat64
_initterm
_iob
_lock
_lseeki64
_onexit
_read
_setjmp3
_strdup
_strnicmp
_ultoa
_unlock
_write
abort
atoi
bsearch
calloc
exit
fclose
fflush
fopen
fprintf
fputc
fputs
fread
free
fseek
ftell
fwrite
getenv
isalnum
isalpha
iscntrl
isdigit
isgraph
islower
isprint
ispunct
isspace
isupper
iswctype
isxdigit
localeconv
longjmp
malloc
memchr
memcmp
memcpy
memmove
memset
printf
rand
realloc
remove
setlocale
setvbuf
sprintf
strchr
strcmp
strcoll
strerror
strftime
strlen
strncmp
strtoul
strxfrm
time
system
tolower
toupper
towlower
towupper
vfprintf
wcscoll
wcsftime
wcslen
wcsxfrm
CoCreateInstance
CoInitialize
CoUninitialize
GetCursorPos
DqHPsnFNa
MMOWrdNZmHtLKhRLdhZD
UJKyGCiS
cqQcmN
peFfubFDNhOusc
rVvuqRmZNog
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ