getActiveDesktop
getSpecials
getSplit
getWnd
Static task
static1
Behavioral task
behavioral1
Sample
003e70bdbfd6afdebb5910ba97d5a995_JaffaCakes118.dll
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
003e70bdbfd6afdebb5910ba97d5a995_JaffaCakes118.dll
Resource
win10v2004-20240508-en
Target
003e70bdbfd6afdebb5910ba97d5a995_JaffaCakes118
Size
19KB
MD5
003e70bdbfd6afdebb5910ba97d5a995
SHA1
c7d25f7da51b9f51ad071aebb98db1f87a354978
SHA256
d9b4b36d733967899c8292dc64b7a146b3cd397e57be1f3e988b49ca55aa97bb
SHA512
3b4accd4e2a8de6fa52a1f265b05305f8d3808b5e8798129a215cf0ef68ea775aca4d78581dc5133624e427773b49b1a147aafd7333070bb9acd781d4799ac2a
SSDEEP
384:jsikLA8Ap++xRLzx7XrzBTRDWrkIECc8sCzxVFHCEWS4EWr:8LA8AYcLt7XBUrQstk
Checks for missing Authenticode signature.
resource |
---|
003e70bdbfd6afdebb5910ba97d5a995_JaffaCakes118 |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Sleep
GetFileAttributesA
lstrcatA
GetProcAddress
DisableThreadLibraryCalls
LoadLibraryA
GetTempPathA
CreateThread
CreateFileA
WideCharToMultiByte
VirtualFreeEx
MultiByteToWideChar
lstrcmpiA
VirtualAllocEx
lstrcmpiW
GetModuleHandleA
CloseHandle
GetCurrentProcessId
GetFileSize
lstrcmpA
lstrlenA
MapViewOfFile
UnmapViewOfFile
VirtualFree
GetSystemDirectoryA
VirtualAlloc
CreateFileMappingW
VirtualProtect
GetModuleHandleW
GetModuleFileNameA
IsBadReadPtr
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
MessageBoxA
CallNextHookEx
RtlFreeAnsiString
strstr
NtQueryInformationThread
NtClose
NtOpenProcess
RtlUnicodeStringToAnsiString
memset
memcpy
getActiveDesktop
getSpecials
getSplit
getWnd
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ