ZtlTaskMemAllocImp
ZtlTaskMemFreeImp
ZtlTaskMemReallocImp
Static task
static1
Behavioral task
behavioral1
Sample
ea0a07c58713afffd685e28ae4ed5098_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea0a07c58713afffd685e28ae4ed5098_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
ea0a07c58713afffd685e28ae4ed5098_JaffaCakes118
Size
5.3MB
MD5
ea0a07c58713afffd685e28ae4ed5098
SHA1
743dcfbbf7d80a05b4781f790c81b21865e4613e
SHA256
1b5eb34a81696cc1c0a502b80dc988b8219c8bd5fe84868f4ff9403ce1bce549
SHA512
541c451a1b815a98cccab5d51637fd9d7d297ae15943f2b988679d43c1f409648ef5477f2e126dc96cd3c2f1d0b944c139233678a42b19314770d48fc22d6c49
SSDEEP
49152:7HeTlP2+ZM4F0UaK1Nl5YN4gZCCQCM0Cla1PrIHsiPe8FLfM9tvnq1ucKMre0b7n:7mNZt0o7YZQCM0nknDLXZPbdaiOxo
Checks for missing Authenticode signature.
resource |
---|
ea0a07c58713afffd685e28ae4ed5098_JaffaCakes118 |
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
CryptImportKey
CryptGetHashParam
RegCloseKey
RegSetValueExA
RegQueryValueExA
RegOpenKeyExA
CryptDeriveKey
CryptDecrypt
CryptCreateHash
CryptHashData
CryptVerifySignatureA
CryptDestroyHash
RegEnumValueA
CryptReleaseContext
CryptDestroyKey
CryptEncrypt
CryptAcquireContextA
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
GetUserNameA
RegCreateKeyExA
RegDeleteValueA
DirectInput8Create
BitBlt
SelectObject
CreateCompatibleDC
DeleteDC
GetStockObject
GetObjectA
OpenProcess
GetModuleFileNameA
LocalLock
ReadProcessMemory
CloseHandle
GetCurrentThreadId
FormatMessageA
lstrlen
LocalAlloc
GetVersionExA
IsBadWritePtr
SetUnhandledExceptionFilter
lstrcmpi
LoadLibraryA
GetProcAddress
FreeLibrary
InterlockedExchange
CreateDirectoryA
FindFirstFileA
DeleteFileA
FindNextFileA
FindClose
GetLastError
CompareFileTime
lstrcpy
FileTimeToSystemTime
GetVersion
SetFilePointer
GetLocalTime
SystemTimeToFileTime
IsDBCSLeadByte
MultiByteToWideChar
LocalFree
SetEnvironmentVariableA
CompareStringW
CompareStringA
GetLocaleInfoW
SetConsoleCtrlHandler
FlushFileBuffers
GetUserDefaultLCID
EnumSystemLocalesA
GetLocaleInfoA
IsValidCodePage
IsValidLocale
GetStringTypeW
GetStringTypeA
IsBadCodePtr
GetFileType
LockResource
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
LCMapStringW
LCMapStringA
GetOEMCP
GetACP
GetCPInfo
HeapCreate
HeapDestroy
GetEnvironmentVariableA
GetCurrentThread
SetLastError
TlsFree
TlsAlloc
FatalAppExitA
HeapSize
HeapReAlloc
GetSystemTime
GetTimeZoneInformation
GetFileAttributesA
GetCommandLineA
GetStartupInfoA
ExitThread
TlsGetValue
InterlockedIncrement
InterlockedDecrement
GetVolumeInformationA
GetWindowsDirectoryA
Thread32Next
Thread32First
Process32Next
Process32First
CreateToolhelp32Snapshot
WideCharToMultiByte
TerminateProcess
SetEvent
InitializeCriticalSection
DeleteCriticalSection
SetEndOfFile
WriteFile
ResumeThread
ResetEvent
SetThreadPriority
GetModuleHandleA
GetExitCodeProcess
WaitForMultipleObjects
CreateProcessA
ReadFile
GetFileSize
CreateEventA
WaitForSingleObject
OpenEventA
GetTickCount
CreateFileA
lstrcat
GetCurrentProcessId
LeaveCriticalSection
EnterCriticalSection
OpenMutexA
CreateThread
TerminateThread
CreateMutexA
ReleaseMutex
GetComputerNameA
lstrcmp
ExitProcess
QueryPerformanceCounter
IsBadReadPtr
GetSystemDirectoryA
GetModuleFileNameW
VirtualProtect
UnmapViewOfFile
MapViewOfFile
OpenFileMappingA
CopyFileA
GetCurrentDirectoryA
VirtualQuery
VirtualAlloc
VirtualFree
LoadLibraryExA
GetTempFileNameA
GetTempPathA
HeapFree
GetProcessHeap
HeapAlloc
GetFileInformationByHandle
DuplicateHandle
GetCurrentProcess
SetStdHandle
CreatePipe
GetStdHandle
PeekNamedPipe
Sleep
lstrlenW
RtlUnwind
RaiseException
FileTimeToLocalFileTime
TlsSetValue
Netbios
SysAllocString
CreateErrorInfo
SysFreeString
SetErrorInfo
VariantInit
VariantChangeType
VariantCopy
SafeArrayDestroy
SafeArrayCreate
VariantClear
GetErrorInfo
SHGetSpecialFolderPathA
wvsprintfA
PtInRect
wsprintfA
BringWindowToTop
AttachThreadInput
GetWindowThreadProcessId
SetRectEmpty
EnumThreadWindows
MessageBoxA
GetWindowTextA
SetRect
MapVirtualKeyA
DialogBoxParamA
FrameRect
LoadBitmapA
IsWindowEnabled
FindWindowA
CreateWindowExA
GetDlgItem
EnableWindow
InternetCloseHandle
FtpOpenFileA
InternetConnectA
InternetOpenA
FtpGetFileSize
FtpGetFileA
timeKillEvent
timeSetEvent
timeGetTime
htonl
WSASend
send
sendto
WSACleanup
WSAStartup
getpeername
socket
inet_addr
gethostbyname
WSAGetLastError
closesocket
htons
ijlFree
ijlWrite
ijlInit
NPKSetDrvPath
NPKOpenDriver
NPKGetAppCompatFlag
NPKLoadAtStartup
NPKRegisterCryptWindowMsg
NPKCloseDriver
NPKSetAppCompatFlag
CoCreateGuid
ZtlTaskMemAllocImp
ZtlTaskMemFreeImp
ZtlTaskMemReallocImp
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE