?CreateDva@@YGHXZ
?GetImagesFrom@@YGHPAXH@Z
?GetModuleMemopry@@YGHXZ
?LoadFileFrom@@YGHXZ
?LoadIcons@@YGHPAXH@Z
_IWMPEvents@0
Static task
static1
Behavioral task
behavioral1
Sample
08fa9fed6aba5e3254dad2560505c217_JaffaCakes118.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
08fa9fed6aba5e3254dad2560505c217_JaffaCakes118.dll
Resource
win10v2004-20240508-en
Target
08fa9fed6aba5e3254dad2560505c217_JaffaCakes118
Size
22KB
MD5
08fa9fed6aba5e3254dad2560505c217
SHA1
b833144e448a4469c7d5ea9c451d6500acb50407
SHA256
ae68e7bcc45a5f51076a0d34609b3dbf715daf6467538adc23ddb579471b76be
SHA512
90a195c9965850e33cae4eb8ea4e1455f925780d0b0b82bbc17ccb3105c0c7eec5c2fcebf3b57ad51cfe9d12af33d9403fa8387099928919cd501d4aa8bda7ce
SSDEEP
384:lxnXzHJ5SciWmW3tS3UT2iXOOO/M1W6Vy97VFw4FI9BQD8WQQWSYLc:3nXiWmWh2iXRbWzTFOQDGAYLc
Checks for missing Authenticode signature.
resource |
---|
08fa9fed6aba5e3254dad2560505c217_JaffaCakes118 |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetProcAddress
MultiByteToWideChar
GetFileAttributesA
GetCurrentProcessId
CreateFileA
ExpandEnvironmentStringsA
CreateThread
LoadLibraryA
GetModuleHandleA
GetShortPathNameA
VirtualAllocEx
Sleep
GetSystemTime
CloseHandle
ReadFile
GetFileSize
WriteFile
SetFilePointer
GetTempFileNameA
GetTickCount
GetTempPathA
ReadProcessMemory
VirtualFreeEx
GetModuleFileNameA
WriteProcessMemory
CallNextHookEx
DispatchMessageA
MessageBoxA
TranslateMessage
GetMessageA
SetWindowsHookExA
RegCloseKey
RegCreateKeyExA
RegSetValueExA
SHGetSpecialFolderLocation
SHGetMalloc
SHGetPathFromIDListA
CoInitialize
CoCreateInstance
free
_adjust_fdiv
_initterm
_onexit
__dllonexit
??1type_info@@UAE@XZ
fopen
fwrite
fclose
memset
strcpy
wcscmp
strcmp
strstr
malloc
memmove
realloc
strlen
??2@YAPAXI@Z
??3@YAXPAX@Z
?CreateDva@@YGHXZ
?GetImagesFrom@@YGHPAXH@Z
?GetModuleMemopry@@YGHXZ
?LoadFileFrom@@YGHXZ
?LoadIcons@@YGHPAXH@Z
_IWMPEvents@0
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ