Startup
e
iep
l
r
Static task
static1
Behavioral task
behavioral1
Sample
d70516f717ff64b1746eb93f15d14fa2_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d70516f717ff64b1746eb93f15d14fa2_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
d70516f717ff64b1746eb93f15d14fa2_JaffaCakes118
Size
44KB
MD5
d70516f717ff64b1746eb93f15d14fa2
SHA1
5320efdf709636cc4925c360fe1127711758af37
SHA256
0ed5923a9c3c5681cffd7cef0998478f8341096a376f6b485ae34995fd9b9b68
SHA512
54ce70ad3bf5f145a017bcb3b28520c58322f55cf427db305be6cb38af100eea3e942d40b2e01d0abff9ebf660421a68075e8e4900177ec83130f6a840199a5a
SSDEEP
768:agGxN2kPyrh+J+LzYMoqN7DKFX4zjdu1QsuyH:a/ykPyF1LMM3BKXOjduusuyH
Checks for missing Authenticode signature.
resource |
---|
d70516f717ff64b1746eb93f15d14fa2_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
lstrcatW
lstrlenW
WideCharToMultiByte
lstrcatA
lstrcpyW
GetLastError
lstrcmpiW
lstrcpynW
ResetEvent
WaitForSingleObject
SetEvent
InterlockedDecrement
SetErrorMode
GetFileAttributesW
CreateProcessW
SuspendThread
TerminateThread
CreateThread
Sleep
GetModuleFileNameW
FreeLibraryAndExitThread
LoadLibraryW
OpenMutexW
CreateMutexW
GetCurrentProcess
GetModuleHandleA
VirtualAlloc
VirtualFree
DisableThreadLibraryCalls
ExitProcess
lstrcmpiA
OpenProcess
Process32FirstW
CreateToolhelp32Snapshot
GetVersionExW
CopyFileW
CreateWaitableTimerW
SetWaitableTimer
GetCurrentThread
GetFileTime
SetFileTime
lstrcmpW
MoveFileW
MoveFileExW
WaitForMultipleObjects
VirtualQuery
CreateFileMappingW
MapViewOfFile
UnmapViewOfFile
GetSystemInfo
FindFirstFileW
FindNextFileW
FindClose
GetSystemWindowsDirectoryW
GetVolumeInformationW
GetSystemTime
MultiByteToWideChar
lstrcpyA
lstrlenA
GetTickCount
WriteFile
SetEndOfFile
SetFilePointer
ReadFile
GetFileSize
CreateFileW
lstrcpynA
CloseHandle
CreateEventW
FreeLibrary
GetProcAddress
Process32NextW
LoadLibraryA
_wcsnicmp
towlower
_strnicmp
toupper
tolower
strlen
memcpy
NtQueryInformationProcess
_snwprintf
wcscpy
wcslen
isalnum
_wtoi
memset
wcscspn
_itow
towupper
wcschr
_chkstk
wsprintfW
SetWindowsHookExW
PostMessageW
CallNextHookEx
GetForegroundWindow
PeekMessageW
DispatchMessageW
TranslateMessage
MsgWaitForMultipleObjects
RegQueryValueExW
RegCloseKey
SetNamedSecurityInfoW
OpenProcessToken
GetTokenInformation
GetSidSubAuthority
GetSidSubAuthorityCount
RegSetValueExW
RegOpenKeyExW
RegNotifyChangeKeyValue
RegCreateKeyExW
RegFlushKey
RegQueryInfoKeyW
RegEnumValueW
SHGetSpecialFolderPathW
ord680
SHGetFolderPathW
CoTaskMemFree
StringFromCLSID
CoCreateGuid
Startup
e
iep
l
r
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ