ooo
ppp
Static task
static1
Behavioral task
behavioral1
Sample
f6f53cf73d9931b72f368ba673d4fd52_JaffaCakes118.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f6f53cf73d9931b72f368ba673d4fd52_JaffaCakes118.dll
Resource
win10v2004-20240412-en
Target
f6f53cf73d9931b72f368ba673d4fd52_JaffaCakes118
Size
27KB
MD5
f6f53cf73d9931b72f368ba673d4fd52
SHA1
347e5bbdc3f49146cf33ca8e4fccf2708dc45199
SHA256
ec708729c74bb95dbdbb5c616108c2eb890c831e19d8014a5c3ae9814b1be4d9
SHA512
6b89c84357902e2f40d91ba5bfcfbb0f29a189ec189586b5d014826fc69056a2d0154f2637b9060c474ca5e583440764c884dcfad8ffbb812700017e78916845
SSDEEP
384:EGMdJGeuwdurrl4HIerfsXoww3KDlNpX+lmd/xYSiyg6ZJg1asCjR:VM6BwIqHIerfs4ww3KDV+8haigsJmCj
Checks for missing Authenticode signature.
resource |
---|
f6f53cf73d9931b72f368ba673d4fd52_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
CreateMutexA
GetCurrentProcessId
DeleteFileA
CloseHandle
ReadFile
CreateFileA
GetTempPathA
VirtualAlloc
RaiseException
GetLocalTime
GetPrivateProfileStringA
VirtualProtect
WriteFile
TerminateProcess
GetCurrentProcess
GetModuleFileNameA
GetTickCount
ExitProcess
VirtualProtectEx
GetLastError
ReadProcessMemory
SetUnhandledExceptionFilter
SetThreadContext
OpenThread
MultiByteToWideChar
CreateProcessA
GetCurrentThreadId
Sleep
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
GetCommandLineA
IsBadReadPtr
TerminateThread
CreateThread
GetModuleHandleA
LoadLibraryA
WideCharToMultiByte
GetProcAddress
CallNextHookEx
GetClassNameA
GetWindowThreadProcessId
GetWindowTextA
RegOpenKeyExA
RegCloseKey
_strupr
_stricmp
_strcmpi
__CxxFrameHandler
??2@YAPAXI@Z
memcpy
strrchr
memset
sprintf
strcat
strcpy
strlen
rand
srand
strcmp
_strlwr
strstr
??3@YAXPAX@Z
strncpy
strchr
ooo
ppp
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ