a
b
Static task
static1
Behavioral task
behavioral1
Sample
ec24e178d8f2c0ea802fbb43cca35bd0_JaffaCakes118.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ec24e178d8f2c0ea802fbb43cca35bd0_JaffaCakes118.dll
Resource
win10v2004-20240226-en
Target
ec24e178d8f2c0ea802fbb43cca35bd0_JaffaCakes118
Size
78KB
MD5
ec24e178d8f2c0ea802fbb43cca35bd0
SHA1
0afb6626c36c81d998182a3bfc01031e7a859727
SHA256
e041f682f1519682daa3ec5fcfed72af844f8346f37e9ef7b47281fb48f6c81e
SHA512
f0b4537db810ec66f11423afe9917ec492f417580394dd245d8b2cbcafc1d57c485952e8d38497b2f798caa6f1d6d43ef0341274aa333ae9ead6b3b744b2eded
SSDEEP
768:wVXZKJdznexu+bhw9lO7rOWbUDL0Igp9C5Rd5WkD9YHzHW5EJUawOQxEI2P8:wVXZKiuO7rxUU/HCh5BOWSatOeEI
Checks for missing Authenticode signature.
resource |
---|
ec24e178d8f2c0ea802fbb43cca35bd0_JaffaCakes118 |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PathFileExistsA
StrStrIW
SetEvent
WriteFile
OpenProcess
GetVolumeInformationA
Sleep
SizeofResource
CreateEventA
GetSystemDirectoryA
CreateFileW
GetLastError
DisableThreadLibraryCalls
LoadResource
CreateFileMappingA
MoveFileA
LockResource
Process32NextW
CreateMutexA
CreateToolhelp32Snapshot
CloseHandle
GetWindowsDirectoryW
HeapSize
FindResourceW
UnmapViewOfFile
MapViewOfFile
Process32FirstW
TlsGetValue
RtlUnwind
InitializeCriticalSectionAndSpinCount
GetCurrentThreadId
GetCommandLineA
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
GetModuleHandleW
GetProcAddress
TlsAlloc
TlsSetValue
TlsFree
SetLastError
LCMapStringA
WideCharToMultiByte
MultiByteToWideChar
LCMapStringW
HeapFree
ExitProcess
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
HeapCreate
HeapDestroy
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetStringTypeA
GetStringTypeW
LeaveCriticalSection
EnterCriticalSection
GetLocaleInfoA
HeapAlloc
VirtualAlloc
HeapReAlloc
LoadLibraryA
CharLowerA
wsprintfA
ImpersonateLoggedOnUser
RegCreateKeyExA
CreateProcessAsUserW
RegQueryValueExA
OpenProcessToken
RegCloseKey
ShellExecuteW
a
b
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ