HookProc
lll
mmm
Static task
static1
Behavioral task
behavioral1
Sample
0dc54badfd3fbf07e553a24d6c9d3809_JaffaCakes118.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0dc54badfd3fbf07e553a24d6c9d3809_JaffaCakes118.dll
Resource
win10v2004-20240611-en
Target
0dc54badfd3fbf07e553a24d6c9d3809_JaffaCakes118
Size
29KB
MD5
0dc54badfd3fbf07e553a24d6c9d3809
SHA1
a2ecaa0cc28a803f2843f286c8301db06ee0b079
SHA256
74604f8bf77a1f29e4f39bcb12c3438397bebddf36203d1e710a690dfea80797
SHA512
006b887bdfa2faf2a477f7250e7e9ad021b71f74d56c978769ba167fac29f6f24838ed5a677789167c209148048e7a4412902b6ecd35d165211e338054eb6178
SSDEEP
384:yKDKc2U+/5DkCGhLroi/TZDSgUW3dHYT4L33BJEs82IdvGIuI7Vrj7B:7WOCDJi/tDSwC4L3TtM4Ihx
Checks for missing Authenticode signature.
resource |
---|
0dc54badfd3fbf07e553a24d6c9d3809_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
WritePrivateProfileStringA
CreateThread
SetEvent
WriteFile
TerminateThread
IsBadReadPtr
VirtualFree
GetPrivateProfileStringA
GetCommandLineA
CreateMutexA
GetCurrentProcessId
GetTickCount
VirtualFreeEx
lstrlenA
VirtualAllocEx
GetCurrentProcess
GetModuleFileNameA
ReadProcessMemory
VirtualAlloc
SetThreadContext
OpenThread
WideCharToMultiByte
MultiByteToWideChar
TerminateProcess
CreateProcessA
ExitProcess
GetCurrentThreadId
DisableThreadLibraryCalls
VirtualProtectEx
CreateEventA
GetLastError
WaitForSingleObject
ResetEvent
CreateFileA
ReadFile
CloseHandle
Sleep
DeleteFileA
GetTempPathA
lstrcatA
GetModuleHandleA
LoadLibraryA
SetUnhandledExceptionFilter
GetProcAddress
GetWindowThreadProcessId
CallNextHookEx
GetWindowTextA
SetWindowsHookExA
RegCreateKeyExA
RegOpenKeyExA
RegSetValueExA
RegCloseKey
_strcmpi
_strlwr
_stricmp
sprintf
strcat
strlen
strcpy
strstr
memset
??2@YAPAXI@Z
memcpy
strrchr
rand
srand
??3@YAXPAX@Z
strncpy
strchr
strcmp
__CxxFrameHandler
HookProc
lll
mmm
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ