__dbk_fcall_wrapper
dbkFCallWrapperAddr
Static task
static1
Behavioral task
behavioral1
Sample
23b14120aecb4d67d836727c729340d9_JaffaCakes118.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
23b14120aecb4d67d836727c729340d9_JaffaCakes118.dll
Resource
win10v2004-20240226-en
Target
23b14120aecb4d67d836727c729340d9_JaffaCakes118
Size
182KB
MD5
23b14120aecb4d67d836727c729340d9
SHA1
225be6cc75963513c72b394180a1bdb5418d9a06
SHA256
4af123558afa33de6944a4766fc63c6ed31b661cda5a1162f89e8f1edec0b0fa
SHA512
9be95e1e489e92967de883bbdf4512b2c9da556958f12d9c3c516bf6d5115c60a6d2a0549b9c0ca5b5c600ae213bd410e8273eecaea334025b591cc4779f96f6
SSDEEP
1536:leKfXcBeQXiQrJY+Brkk53AgZeOGTlbR30oNdJWc6FPfwnS3c1NwGqbQMgsjinUI:gKd8OMIOGMEnYs0iIVZuqDSo7Cp
Checks for missing Authenticode signature.
resource |
---|
23b14120aecb4d67d836727c729340d9_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
GetFileType
EnterCriticalSection
GetACP
SetFilePointer
LocalFree
CloseHandle
VirtualProtectEx
VirtualProtect
TlsAlloc
GetTickCount
ReadProcessMemory
lstrcmpiA
VirtualFree
GetFileSize
GetStartupInfoW
ExitProcess
GetFileAttributesW
InitializeCriticalSection
VirtualAlloc
WriteProcessMemory
RtlUnwind
GetCPInfo
GetSystemInfo
GetCommandLineW
GetProcAddress
LeaveCriticalSection
EnumSystemLocalesW
VirtualAllocEx
GetStdHandle
GetVersionExW
GetModuleHandleA
VerifyVersionInfoW
GetModuleHandleW
FreeLibrary
ReadFile
GetDiskFreeSpaceW
VerSetConditionMask
GetUserDefaultUILanguage
FindFirstFileW
TlsFree
CreateProcessW
GetConsoleOutputCP
CreateRemoteThread
GetConsoleCP
SetLastError
GetModuleFileNameW
GetLastError
lstrlenW
QueryPerformanceCounter
CompareStringW
SetEndOfFile
WideCharToMultiByte
MultiByteToWideChar
FindClose
LoadLibraryA
ResetEvent
SetEvent
GetLocaleInfoW
CreateFileW
GetVersion
RaiseException
SwitchToThread
GetExitCodeThread
GetLocalTime
WaitForSingleObject
WriteFile
DeleteCriticalSection
TlsGetValue
IsValidLocale
TlsSetValue
LoadLibraryExW
GetSystemDefaultUILanguage
EnumCalendarInfoW
LocalAlloc
GetCurrentThreadId
UnhandledExceptionFilter
VirtualQuery
CreateEventW
GetThreadLocale
Sleep
SetThreadLocale
GetFileVersionInfoSizeW
VerQueryValueW
GetFileVersionInfoW
CharUpperBuffW
CharNextW
CharLowerBuffW
LoadStringW
CharUpperW
GetSystemMetrics
FindWindowW
MessageBoxW
SysAllocStringLen
SysFreeString
SysReAllocStringLen
NetWkstaGetInfo
NetApiBufferFree
RegQueryValueExW
RegCloseKey
RegOpenKeyExW
__dbk_fcall_wrapper
dbkFCallWrapperAddr
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ