AMService
DataChange
EndWork
Level
Static task
static1
Behavioral task
behavioral1
Sample
011cd060fdaa3d00143c85ad3dda3440_JaffaCakes118.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
011cd060fdaa3d00143c85ad3dda3440_JaffaCakes118.dll
Resource
win10v2004-20240611-en
Target
011cd060fdaa3d00143c85ad3dda3440_JaffaCakes118
Size
84KB
MD5
011cd060fdaa3d00143c85ad3dda3440
SHA1
6752bcefd50ebdc9b8f5319741ec995e7486f9d6
SHA256
c699764b5f62bb086093df70c2359b1c7f05605c07b0b4ef5cc8c249e4061dab
SHA512
63e5af6a46a6a8494866116560f2a6abd37d9ae2235e0d830a353f4ead9d2487db3353cd69bd27676a457ae0df2d8f88163859a430ecd3296cb7e281d0cb6899
SSDEEP
1536:/NymviW0ir18Buu5zCiqVeDWGUsUkcYBsbfiaKV8fTYGrkENV8F:/NJviv5+reRPUkrBsriaKlGrkENV8F
Checks for missing Authenticode signature.
resource |
---|
011cd060fdaa3d00143c85ad3dda3440_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetProcAddress
LoadLibraryA
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
CreateEventA
CloseHandle
WaitForSingleObject
ResetEvent
SetEvent
CancelIo
Sleep
lstrcpyA
DeleteFileA
GetLastError
CreateDirectoryA
GetFileAttributesA
lstrlenA
FreeLibrary
GetDriveTypeA
GetDiskFreeSpaceExA
GetVolumeInformationA
GetLogicalDriveStringsA
FindClose
LocalFree
FindNextFileA
LocalReAlloc
FindFirstFileA
LocalAlloc
GetFileSize
ReadFile
SetFilePointer
MoveFileA
lstrcatA
CreateProcessA
CreateThread
TerminateThread
InterlockedExchange
Process32Next
lstrcmpiA
Process32First
CreateToolhelp32Snapshot
GetTickCount
WriteFile
CreateFileA
GetLocalTime
HeapFree
GetProcessHeap
OutputDebugStringA
HeapAlloc
UnmapViewOfFile
GetModuleHandleA
VirtualFree
VirtualAlloc
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalSize
GetStartupInfoA
PeekNamedPipe
WaitForMultipleObjects
LocalSize
TerminateProcess
OpenProcess
GetCurrentThreadId
GetComputerNameA
OpenEventA
SetErrorMode
GetCurrentProcess
GetWindowsDirectoryA
SetFileAttributesA
CopyFileA
ExpandEnvironmentStringsA
GetModuleFileNameA
RaiseException
memset
??2@YAPAXI@Z
memcmp
free
malloc
_except_handler3
strcmp
sprintf
strcpy
strrchr
puts
strcat
__CxxFrameHandler
_beginthreadex
atoi
wcstombs
rand
_access
srand
calloc
_initterm
_adjust_fdiv
strstr
strlen
_ftol
ceil
memmove
strncpy
memcpy
??3@YAXPAX@Z
_strrev
_stricmp
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
AMService
DataChange
EndWork
Level
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ