e
l
r
Static task
static1
Behavioral task
behavioral1
Sample
f28f4a9d80891c215149328ac5d2839a_JaffaCakes118.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f28f4a9d80891c215149328ac5d2839a_JaffaCakes118.dll
Resource
win10v2004-20240412-en
Target
f28f4a9d80891c215149328ac5d2839a_JaffaCakes118
Size
16KB
MD5
f28f4a9d80891c215149328ac5d2839a
SHA1
95f787c8e923ac73d4fc999dda8add5f86d105e5
SHA256
1f8fdcf42444937f065fb09c1d87defc4ba99067baf921d0e746ce526a187893
SHA512
7ab9410aad9108dd1c0d2eba0670e5a59fb6d5a7b919af54f8eab1e460f6d5533abff5d771a09c8892ff6542c248e1eac72061f0b14c9b1fcf5c2059eda44540
SSDEEP
384:s+6X9gqNBaUOmZsX1DJzHODvSmfJhKJHDVbKyVjb5ht5ncJQPDIc:qgq/zZsX1DtHCK4KJjbVbXt5ncJ+D
Checks for missing Authenticode signature.
resource |
---|
f28f4a9d80891c215149328ac5d2839a_JaffaCakes118 |
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
MultiByteToWideChar
GetTickCount
CloseHandle
WriteFile
ReadFile
CreateFileA
lstrcatA
lstrcmpA
SetFilePointer
CreateEventA
GetProcAddress
GetTempPathA
GetFileAttributesA
HeapReAlloc
HeapFree
GetThreadLocale
GetLastError
GetFileAttributesW
GetSystemDefaultLCID
GlobalFree
GetProcessHeap
HeapAlloc
GlobalAlloc
lstrcpynA
lstrcpyA
GetModuleHandleA
GetUserDefaultLCID
lstrlenA
ShowWindow
wsprintfA
CallWindowProcA
DestroyWindow
EnableWindow
CreateWindowExW
SetWindowLongA
SetDlgItemTextA
MessageBoxA
wsprintfW
SetWindowTextA
SendMessageA
GetDlgItem
GetFocus
IsWindowVisible
RegisterWindowMessageA
GetClientRect
GetWindowRect
CreateWindowExA
GetWindowLongA
BeginPaint
RegOpenKeyExA
RegSetValueExA
RegOpenKeyA
RegQueryValueExA
RegCloseKey
InternetConnectA
InternetSetFilePointer
InternetCloseHandle
InternetOpenA
HttpOpenRequestA
e
l
r
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ