a
b
c
Static task
static1
Behavioral task
behavioral1
Sample
eb4026833a0139b009aaf13fc1dce7c7_JaffaCakes118.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
eb4026833a0139b009aaf13fc1dce7c7_JaffaCakes118.dll
Resource
win10v2004-20240226-en
Target
eb4026833a0139b009aaf13fc1dce7c7_JaffaCakes118
Size
39KB
MD5
eb4026833a0139b009aaf13fc1dce7c7
SHA1
ef07f26ae54330827671832462d7bec587bbcd91
SHA256
dd254c06db8915e214aee7cd4f88102534873234efd6baf914b7ed0c50433b65
SHA512
2096946d7d821e23f5701e7a4574463d5647c19bd16419c1340ffd450ffaa0996719ae257aaccfcd0ca3036449ae397ccba4e0d0ced164eee2826b0faaecb482
SSDEEP
384:RP5xflSSgoqN0FlfPdtNGxKyoFxUUurdnLz6JBvhBSPhl9pLx:R5JlTg1uPPNGWUUuhLz6JBJBo5
Checks for missing Authenticode signature.
resource |
---|
eb4026833a0139b009aaf13fc1dce7c7_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetProcAddress
GetModuleHandleA
MulDiv
GetTickCount
WriteFile
ReadFile
CreateFileA
WaitForMultipleObjects
WaitForSingleObject
DeleteFileA
CreateEventA
SetFilePointer
GetModuleFileNameA
GetTempPathA
InterlockedExchange
RtlUnwind
GetTempFileNameA
HeapReAlloc
HeapFree
GetProcessHeap
HeapAlloc
CloseHandle
ReleaseMutex
lstrlenA
CreateProcessA
ExitThread
CreateThread
GetLastError
SetEvent
GlobalFree
GlobalAlloc
lstrcpynA
lstrcpyA
VirtualQuery
ShowWindowAsync
DestroyWindow
CallWindowProcA
EnableWindow
GetWindowLongA
CreateWindowExA
GetWindowRect
RegisterWindowMessageA
SetWindowLongA
SetDlgItemTextA
MessageBoxA
wsprintfA
SetWindowTextA
SendMessageA
GetDlgItem
GetFocus
IsWindowVisible
CloseWindow
MsgWaitForMultipleObjects
DispatchMessageA
TranslateMessage
PeekMessageA
CharLowerBuffA
ShowWindow
GetClientRect
RegOpenKeyA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
RegEnumValueA
InternetReadFile
InternetSetFilePointer
InternetOpenA
InternetCloseHandle
InternetCrackUrlA
FindCloseUrlCache
FindFirstUrlCacheEntryA
InternetConnectA
HttpOpenRequestA
HttpSendRequestA
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
a
b
c
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ