Elc
Jmb
Oxy
Rly
Static task
static1
Behavioral task
behavioral1
Sample
0f5e5a1943608c46fc757b84b6f84670_JaffaCakes118.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
0f5e5a1943608c46fc757b84b6f84670_JaffaCakes118.dll
Resource
win10v2004-20240508-en
Target
0f5e5a1943608c46fc757b84b6f84670_JaffaCakes118
Size
118KB
MD5
0f5e5a1943608c46fc757b84b6f84670
SHA1
c48ff515e5bbdcfc70935f3f647f6ee58311af57
SHA256
f5014cd5640bfa8cfcbc39778f6eeabd0d21c2c39e66d27a7efce0b6562ae0fa
SHA512
59d2c8b31cc91171f533f1f5700849def202f2101da208dfbb8187b6ca86391219748c0e5a1f8f474b44a2d4ab7c4f97fcfed767951ab72ae12b73e0af34c0de
SSDEEP
3072:4kcpEXYF4VusHx8XBqN5XUz0gBFZKMMiU1m9:KEomVp8XBi/qFZKNP
Checks for missing Authenticode signature.
resource |
---|
0f5e5a1943608c46fc757b84b6f84670_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
VariantCopyInd
VariantClear
SysAllocStringLen
LoadTypeLib
ControlService
CreateServiceA
DeleteService
InitializeSecurityDescriptor
OpenProcessToken
OpenServiceA
QueryServiceStatus
SetSecurityDescriptorDacl
StartServiceA
CloseServiceHandle
AdjustTokenPrivileges
StgCreateDocfileOnILockBytes
CLSIDFromProgID
OleUninitialize
GetRunningObjectTable
DoDragDrop
CreateILockBytesOnHGlobal
CoTaskMemRealloc
CoTaskMemFree
CoRevokeClassObject
CoRegisterMessageFilter
CoCreateInstance
OleSetClipboard
ShowCaret
GetWindowTextA
FillRect
DestroyCursor
CreateAcceleratorTableA
CharUpperA
CharPrevA
SetCursor
SHBindToParent
SHGetFileInfoA
SHFileOperationA
SHAutoComplete
PathFindFileNameA
StrChrA
StrStrIA
PathIsRelativeA
PathUnquoteSpacesA
memset
rand
sscanf
strchr
strcmp
strstr
time
_except_handler3
memchr
getenv
free
fflush
__set_app_type
malloc
GetVersionExA
SetLastError
TlsFree
GetSystemTime
FreeResource
GetVersion
Elc
Jmb
Oxy
Rly
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ