BltjYNi
PFYYyrPGlTpa
bjyeEklXKHL
cQzjCbb
klHovjqLsWes
Static task
static1
Behavioral task
behavioral1
Sample
2c7f7329b6b1ef10ec118c988647c53e_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2c7f7329b6b1ef10ec118c988647c53e_JaffaCakes118.dll
Resource
win10v2004-20241007-en
Target
2c7f7329b6b1ef10ec118c988647c53e_JaffaCakes118
Size
104KB
MD5
2c7f7329b6b1ef10ec118c988647c53e
SHA1
331df3529ffab5bf29f687351fe2b91ad4fd54f8
SHA256
b2b9696fb84027aae1c7c9175e5104d0329901be14bf30fe4e6c3e84947aed65
SHA512
5631af763cdf45ce305d2e94e575225ed0c036b0b3d99b14ef1a4599bf07252f71110ce643866d6c791cd1555bf50f7385fb08be574564e09ded47bf35335c77
SSDEEP
1536:HrD3jp27CGnCpqppBCpx9B001jnXuhYIVqdQVClUR2NR+kQCSuO:vd27+cdCvn001zX8aQVBqR6
Checks for missing Authenticode signature.
resource |
---|
2c7f7329b6b1ef10ec118c988647c53e_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
lstrcpyA
QueryPerformanceCounter
GetCurrentThreadId
GetProcessHeap
HeapFree
FindAtomA
ReadFile
HeapAlloc
GetFileSize
Sleep
OpenProcess
GetTempFileNameA
GetTempPathA
DeleteFileA
GetCurrentProcess
VirtualAlloc
GlobalAlloc
FreeLibrary
LoadLibraryA
VirtualQueryEx
GetThreadContext
GlobalFree
TerminateProcess
ResumeThread
VirtualFree
CreateEventA
GetVersionExA
lstrcmpA
lstrcmpiA
GetSystemDirectoryA
GetSystemTime
MoveFileA
WritePrivateProfileStringA
GetWindowsDirectoryA
MoveFileExA
ReleaseMutex
lstrlenA
GetLocaleInfoA
GetVolumeInformationA
SetEvent
SystemTimeToFileTime
HeapSize
LCMapStringW
LCMapStringA
GetStringTypeW
MultiByteToWideChar
GetStringTypeA
InitializeCriticalSectionAndSpinCount
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
HeapReAlloc
IsValidCodePage
GetOEMCP
GetACP
lstrcpynA
lstrcatA
CreateFileA
WriteFile
CloseHandle
CreateProcessA
GetVersion
ExitProcess
GetModuleHandleA
GetProcAddress
WaitForSingleObject
GetCPInfo
EnterCriticalSection
LeaveCriticalSection
GetSystemTimeAsFileTime
CreateMutexA
GetTickCount
GetLastError
GetCommandLineA
RtlUnwind
VirtualQuery
GetModuleHandleW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
InterlockedDecrement
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
HeapCreate
HeapDestroy
GetCurrentProcessId
GetWindowTextA
MessageBoxA
OpenInputDesktop
GetThreadDesktop
SetThreadDesktop
FindWindowA
GetWindowThreadProcessId
CloseDesktop
GetCursorPos
IsWindowVisible
EqualRect
InflateRect
GetFocus
ClientToScreen
DefWindowProcA
LoadIconA
LoadCursorA
RegisterClassExA
CreateWindowExA
GetMessageA
TranslateMessage
DispatchMessageA
wsprintfA
GetWindowRect
FindWindowExA
RegDeleteKeyA
OpenProcessToken
RegOpenKeyExA
RegEnumKeyExA
RegQueryValueExA
CreateProcessAsUserA
RegEnumValueA
RegDeleteValueA
RegCreateKeyExA
RegCloseKey
SHDeleteKeyA
SHDeleteValueA
SHGetValueA
SHSetValueA
GetBkColor
GetBkMode
BltjYNi
PFYYyrPGlTpa
bjyeEklXKHL
cQzjCbb
klHovjqLsWes
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ