sUuInst
sUuRun
sUuShutdown
sUuStartup
sUuTest
Static task
static1
Behavioral task
behavioral1
Sample
dc567477668b8bb0ea3e6438d204900b_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dc567477668b8bb0ea3e6438d204900b_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
dc567477668b8bb0ea3e6438d204900b_JaffaCakes118
Size
30KB
MD5
dc567477668b8bb0ea3e6438d204900b
SHA1
075e3a6cb89cd46f8d2a2a731212d83368916418
SHA256
f5a4066948ce1b6da3623797bde113617baf54ad4f353565dd61e8cd5f9f929e
SHA512
86c4af999419fa223086242641f3d35145618783087b7d20fd844dbf7bca4d24877baae53edb6ea1a4772e8327488ce0ebd62fe236606b29245cfb1f9d27dbe1
SSDEEP
768:576Okz0F2DGyctipW3Jk3fcIuBmV1AwrrM:57hFYjckWJD4Aw
Checks for missing Authenticode signature.
resource |
---|
dc567477668b8bb0ea3e6438d204900b_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetTickCount
FindAtomA
GetModuleFileNameA
CreateMutexA
WriteFile
CloseHandle
GetVersion
GetTempPathA
GetSystemTime
GetCurrentThreadId
GetVersionExA
SetEvent
lstrcmpiA
GetProcAddress
VirtualAlloc
VirtualFree
CopyFileA
lstrcpyA
GetWindowsDirectoryA
GetFileSize
LoadLibraryA
OpenProcess
GetVolumeInformationA
WritePrivateProfileStringA
lstrcmpA
MoveFileA
GetLocaleInfoA
GetLocalTime
MoveFileExA
FreeLibrary
GetModuleHandleA
SystemTimeToFileTime
GetSystemDirectoryA
WriteProcessMemory
DeleteFileA
HeapAlloc
HeapFree
GetProcessHeap
ReadProcessMemory
ReadFile
VirtualProtectEx
GetTempFileNameA
VirtualQueryEx
GlobalAlloc
TerminateProcess
GlobalFree
ResumeThread
GetThreadContext
SetThreadContext
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
VirtualQuery
RtlUnwind
WaitForSingleObject
GetLastError
lstrcpynA
lstrlenA
CreateFileA
lstrcatA
CreateProcessA
CreateThread
CreateEventA
Sleep
IsDebuggerPresent
SetThreadDesktop
SetWindowsHookExA
GetWindowRect
GetCursorPos
FindWindowExA
GetFocus
PostMessageA
CallNextHookEx
EqualRect
wsprintfA
GetThreadDesktop
OpenInputDesktop
GetCaretPos
ClientToScreen
GetWindowThreadProcessId
IsWindowVisible
FindWindowA
InflateRect
CloseDesktop
RegOpenKeyExA
CreateProcessAsUserA
RegDeleteValueA
RegQueryValueExA
OpenProcessToken
RegDeleteKeyA
RegEnumValueA
RegEnumKeyExA
RegCloseKey
SHDeleteKeyA
SHDeleteValueA
SHSetValueA
SHGetValueA
GetAdaptersInfo
sUuInst
sUuRun
sUuShutdown
sUuStartup
sUuTest
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ