iii
jjj
Static task
static1
Behavioral task
behavioral1
Sample
f16073e1e96abc4db0b49b386db4c313_JaffaCakes118.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f16073e1e96abc4db0b49b386db4c313_JaffaCakes118.dll
Resource
win10v2004-20240412-en
Target
f16073e1e96abc4db0b49b386db4c313_JaffaCakes118
Size
29KB
MD5
f16073e1e96abc4db0b49b386db4c313
SHA1
a94c345298c9c34bbad15f43b91b5095cc8a6c5f
SHA256
3f712b3cb4739aaac3e4840d7890fee8fbdee63d0658dca45601504692ff88c8
SHA512
683e9e57de6e74835a1ecfb97db0c31a28fbda55d635420bf7e657d49331ec1cd55dac642210d857451828de44837ccfd30228236104fd1157f12b676139e428
SSDEEP
384:7TCtBpY7+e5Tut4JHU3bWbclTIo4DsPANY/qXkQ+0kOLqYDWEtq1DOdqQs6:7gI75Mt4JHULWgl8vDE/J9WgEtaO/h
Checks for missing Authenticode signature.
resource |
---|
f16073e1e96abc4db0b49b386db4c313_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
CreateFileA
GetTempPathA
VirtualAlloc
GetCommandLineA
WriteFile
IsBadReadPtr
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
SetFilePointer
GetModuleFileNameA
ExitProcess
InitializeCriticalSection
VirtualProtectEx
VirtualProtect
GetPrivateProfileStringA
WideCharToMultiByte
LeaveCriticalSection
EnterCriticalSection
ReadFile
ReadProcessMemory
SetUnhandledExceptionFilter
SetThreadContext
OpenThread
MultiByteToWideChar
TerminateProcess
CreateProcessA
GetSystemDirectoryA
GetCurrentThreadId
GetCurrentProcess
CloseHandle
GetLocalTime
DeleteFileA
Sleep
GetModuleHandleA
GetProcAddress
VirtualAllocEx
TerminateThread
CreateThread
GetCurrentProcessId
CreateMutexA
LoadLibraryA
GetLastError
FindWindowA
CallNextHookEx
GetAsyncKeyState
UnhookWindowsHookEx
SetWindowsHookExA
GetForegroundWindow
GetWindowTextA
GetWindowThreadProcessId
ToAscii
InternetCloseHandle
InternetReadFile
strchr
fclose
fread
fopen
_strcmpi
_stricmp
_strupr
_strlwr
??3@YAXPAX@Z
atoi
strrchr
wcslen
strcat
sprintf
strcpy
strlen
strncpy
strstr
strcmp
??2@YAPAXI@Z
memcpy
memset
iii
jjj
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ