fa
fb
Static task
static1
Behavioral task
behavioral1
Sample
ead69f348fd9003e34bd243788513366_JaffaCakes118.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ead69f348fd9003e34bd243788513366_JaffaCakes118.dll
Resource
win10v2004-20240226-en
Target
ead69f348fd9003e34bd243788513366_JaffaCakes118
Size
48KB
MD5
ead69f348fd9003e34bd243788513366
SHA1
8003aba2dbf13eab08bf2634365a5d704f035127
SHA256
e8eb737163d2cb3ab6ad40d8281c70425e3504baa163ffb0a32de2179952a088
SHA512
1d74d41d9209379a5b9d93f240c6f01fc62cc1cc264232a94ed6e4f3a94c59b741b37b8210ce90a4ec0c76cc617644ec6516c830fa804ec3322cf0450174f88a
SSDEEP
768:XD0yax59Pv7bZlQDLEw0pwTsvbchFdSYKJR69Q5BTro9j+w:Ax9zQDN0pwTsvYAYKPRtoN+w
Checks for missing Authenticode signature.
resource |
---|
ead69f348fd9003e34bd243788513366_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Sleep
ReadProcessMemory
WriteProcessMemory
CloseHandle
WideCharToMultiByte
CreateThread
GetCurrentProcess
GetModuleFileNameA
RtlUnwind
GetCommandLineA
GetVersion
EnterCriticalSection
LeaveCriticalSection
HeapFree
GetLastError
ReadFile
SetFilePointer
InitializeCriticalSection
ExitProcess
TerminateProcess
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
HeapDestroy
HeapCreate
VirtualFree
WriteFile
InterlockedDecrement
InterlockedIncrement
HeapAlloc
VirtualAlloc
HeapReAlloc
SetStdHandle
FlushFileBuffers
CreateFileA
GetCPInfo
GetACP
GetOEMCP
GetProcAddress
LoadLibraryA
SetEndOfFile
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
SetWindowsHookExA
UnhookWindowsHookEx
CallNextHookEx
LookupPrivilegeValueA
AdjustTokenPrivileges
OpenProcessToken
InternetCloseHandle
InternetOpenUrlA
InternetOpenA
InternetReadFile
fa
fb
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ