a
b
c
Static task
static1
Behavioral task
behavioral1
Sample
fa892d6eed0066286bb93df739ac9a3e_JaffaCakes118.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
fa892d6eed0066286bb93df739ac9a3e_JaffaCakes118.dll
Resource
win10v2004-20240412-en
Target
fa892d6eed0066286bb93df739ac9a3e_JaffaCakes118
Size
18KB
MD5
fa892d6eed0066286bb93df739ac9a3e
SHA1
5efeae9253f740401a84399065962b1778150d5b
SHA256
93b724536b967684749bea31324efe53ad6c82af3a364e40b14850c6eb85f954
SHA512
e4782e3d2ef0fa05d5ab0fa138f70c2aeeeee05fb3c206aab73b850f749d30fbfd3e1ae9ab5e0f7dec2f6c10ccb1f49a9bebc3e39ff2b1b4e5b55d3015a66537
SSDEEP
384:+5MPeShoDsI/CRraShz4dMCyqKzkW9c8ZrwzCFUOUGvHaWVbk:++Pzo4M0raG47yLkW9curwzCyFG/
Checks for missing Authenticode signature.
resource |
---|
fa892d6eed0066286bb93df739ac9a3e_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetFileAttributesA
ReadFile
lstrcatA
MultiByteToWideChar
GetProcAddress
GlobalFree
GetModuleFileNameA
GetModuleHandleA
CloseHandle
GetTempPathA
lstrcpyA
CreateEventA
RtlUnwind
GlobalAlloc
WriteFile
GetProcessHeap
GetTickCount
HeapFree
HeapAlloc
lstrlenA
GetThreadLocale
GetSystemDefaultLCID
GetUserDefaultLCID
lstrcpynA
HeapReAlloc
SetFilePointer
lstrcmpA
CreateFileA
InterlockedExchange
GetLastError
VirtualQuery
SetDlgItemTextA
CallWindowProcA
EnableWindow
SetWindowTextA
IsWindowVisible
DestroyWindow
GetWindowRect
GetFocus
wsprintfA
GetClientRect
SendMessageA
RegisterWindowMessageA
SetWindowLongA
MessageBoxA
GetWindowLongA
GetDesktopWindow
GetKeyboardLayoutList
GetDlgItem
ShowWindow
CreateWindowExW
RegQueryValueExA
RegCloseKey
RegOpenKeyA
RegOpenKeyExA
RegSetValueExA
HttpOpenRequestA
InternetSetFilePointer
FindCloseUrlCache
InternetOpenA
InternetCloseHandle
InternetConnectA
a
b
c
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ