fa
fc
Static task
static1
Behavioral task
behavioral1
Sample
f09744ef310e22ceffeee1c40075b106_JaffaCakes118.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f09744ef310e22ceffeee1c40075b106_JaffaCakes118.dll
Resource
win10v2004-20240412-en
Target
f09744ef310e22ceffeee1c40075b106_JaffaCakes118
Size
7KB
MD5
f09744ef310e22ceffeee1c40075b106
SHA1
8dafe80e2a036ce11ccfcf806cc67598d7a567cd
SHA256
c18281ad6deaa83126855224a0c6a56f6a359fd2227da3b1f3997564266e24fc
SHA512
2ba80ee65bcfe7a8f74d6f3cc6e2ff29b338a8cc98f0442b441fd4f3ecf9e5d22068670c4de8ee0efc50681ec8c9d5c28fed9a0c50eb31df21ea858c12e06912
SSDEEP
96:HOMRb4A84nmmzGljuiEFTXZGg8hzoGOLEafhaMba:uOb4A8iOqFNUvhzqLLsMb
Checks for missing Authenticode signature.
resource |
---|
f09744ef310e22ceffeee1c40075b106_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Sleep
VirtualProtectEx
GlobalFree
IsBadReadPtr
GlobalLock
GlobalAlloc
GetCurrentProcess
CreateThread
GetModuleFileNameA
ReadProcessMemory
EnumChildWindows
GetClassNameA
IsWindowVisible
SetWindowsHookExA
UnhookWindowsHookEx
CallNextHookEx
SendMessageA
FindWindowA
FindWindowExA
InternetCloseHandle
InternetOpenUrlA
InternetOpenA
InternetReadFile
strrchr
_adjust_fdiv
malloc
_initterm
free
memcpy
??3@YAXPAX@Z
strcmp
strlen
??2@YAPAXI@Z
sprintf
strcpy
_stricmp
fa
fc
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ