rewc
tretre
Static task
static1
Behavioral task
behavioral1
Sample
e89d76375b966667e933e5355640d406_JaffaCakes118.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e89d76375b966667e933e5355640d406_JaffaCakes118.dll
Resource
win10v2004-20240226-en
Target
e89d76375b966667e933e5355640d406_JaffaCakes118
Size
44KB
MD5
e89d76375b966667e933e5355640d406
SHA1
eb65b6ebe9cd109ea6b28c1fc3bdb78917fcab91
SHA256
c476ddbe7e8e71bb4789d43b7c3683d177f3dd7a6678a93bc5bd4a3a616bad4d
SHA512
32c5ea4e5084a4704fdf705ab10aca4619b679376a2399808fc7430ead50a484d605c964090ef2f736bcfafb2ad88ca61c5f3e2e819b72424cdec8b968f7ee0c
SSDEEP
768:bO7KYmCN91kdqrC7I4UR2RbDLzjgNouoHRiFZwdyBJB:bKnGnLioH6/B
Checks for missing Authenticode signature.
resource |
---|
e89d76375b966667e933e5355640d406_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetCurrentProcessId
GetTickCount
VirtualProtect
CloseHandle
ReadFile
CreateFileA
GetModuleFileNameA
WriteFile
DeleteFileA
InitializeCriticalSection
VirtualProtectEx
GetPrivateProfileStringA
WideCharToMultiByte
LeaveCriticalSection
EnterCriticalSection
LoadLibraryA
ReadProcessMemory
CreateMutexA
SetThreadContext
OpenThread
MultiByteToWideChar
TerminateProcess
CreateProcessA
VirtualAlloc
GetCurrentThreadId
GetCurrentProcess
GetLastError
ExitProcess
Sleep
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
GetCommandLineA
IsBadReadPtr
TerminateThread
CreateThread
GetModuleHandleA
SetUnhandledExceptionFilter
GetProcAddress
CallNextHookEx
GetWindowThreadProcessId
GetWindowTextA
_stricmp
_strcmpi
_strupr
_strlwr
??2@YAPAXI@Z
memcpy
strrchr
memset
sprintf
strcat
strcpy
strlen
rand
srand
strcmp
wcslen
strstr
??3@YAXPAX@Z
strncpy
strchr
__CxxFrameHandler
rewc
tretre
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ