_FindProcessByName@8
_GetCuProcessId@8
_GetCurProcesInfo@4
_GetCurProcessHandle@12
_GetProcessList@20
Static task
static1
Behavioral task
behavioral1
Sample
26a2a9cc91919ac15c54f0f2da4b516d_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
26a2a9cc91919ac15c54f0f2da4b516d_JaffaCakes118.dll
Resource
win10v2004-20241007-en
Target
26a2a9cc91919ac15c54f0f2da4b516d_JaffaCakes118
Size
136KB
MD5
26a2a9cc91919ac15c54f0f2da4b516d
SHA1
1f4f4aab28289c18977d851ecbe082f9b73b7660
SHA256
d9f88f0d82abdd0098a9292b5f66a64c3b8fcd901a006d6153db0d9e77113054
SHA512
69dd16563abf696c5e64b512c012f9803f368dc00a6d30e8f1bb39646e69b917f7c80c0ccb1565859e02bfff76c0f4cfaa5e2ee68c97f9c936180dc1bc210da6
SSDEEP
3072:di8C70CedLFABh1ajrJ3eGF7HiATTVyJd4cc/vXsTH:dxLFaijl3es7JLVs
Checks for missing Authenticode signature.
resource |
---|
26a2a9cc91919ac15c54f0f2da4b516d_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
_vsnprintf
GetProcessHeap
HeapDestroy
GetFileAttributesW
GetProcessHeaps
GlobalFree
GetFileType
GetModuleHandleA
DeleteCriticalSection
CloseHandle
GetVersion
LocalFree
GlobalReAlloc
SetFileAttributesW
LocalAlloc
LockFile
InterlockedExchange
GetLastError
LoadLibraryA
RaiseException
WaitForMultipleObjects
GetFileInformationByHandle
GetCurrentProcess
SetEnvironmentVariableW
GetModuleHandleW
ExpandEnvironmentStringsA
SetFileTime
MulDiv
UnlockFile
GlobalSize
SystemTimeToFileTime
GlobalAddAtomA
GetCommandLineW
LoadResource
FreeLibrary
TryEnterCriticalSection
FindResourceA
GlobalMemoryStatus
SetCriticalSectionSpinCount
GetFileSize
lstrcpyA
GetSystemTime
GetProcAddress
VirtualProtectEx
MoveWindow
IsCharAlphaNumericA
SetClipboardViewer
UpdateWindow
SetCaretPos
GetClipboardViewer
MessageBoxW
DestroyCursor
GetWindowPlacement
GetDC
CreateIconIndirect
ShowCaret
EndPaint
TranslateAcceleratorW
SetWindowRgn
GetMessageExtraInfo
DrawTextW
GetLastActivePopup
FindWindowExA
GetWindowTextLengthA
BeginPaint
GetClassLongW
TranslateMessage
ScrollDC
SetClassLongW
PeekMessageW
RedrawWindow
CreateWindowExW
SwitchToThisWindow
CallWindowProcW
GetMessagePos
DispatchMessageW
GetWindowLongW
GetClassWord
LockWindowUpdate
LoadAcceleratorsA
SetTextJustification
CreateCompatibleDC
DeleteObject
UnrealizeObject
GetDeviceCaps
RestoreDC
GetPixel
Chord
SetDCPenColor
GetCharWidthA
DPtoLP
GetDCPenColor
GetTextMetricsW
GetObjectW
ReportEventW
ImpersonateNamedPipeClient
ImpersonateSelf
GetOldestEventLogRecord
GetEventLogInformation
DeregisterEventSource
WriteEncryptedFileRaw
CloseEncryptedFileRaw
GetTokenInformation
RevertToSelf
_FindProcessByName@8
_GetCuProcessId@8
_GetCurProcesInfo@4
_GetCurProcessHandle@12
_GetProcessList@20
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ