fff
ggg
Static task
static1
Behavioral task
behavioral1
Sample
17daa3ef47015911f672b29e15e5c1a0_JaffaCakes118.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
17daa3ef47015911f672b29e15e5c1a0_JaffaCakes118.dll
Resource
win10v2004-20240508-en
Target
17daa3ef47015911f672b29e15e5c1a0_JaffaCakes118
Size
40KB
MD5
17daa3ef47015911f672b29e15e5c1a0
SHA1
c53277bf1c27866ee6121d2faa4d36a3870c6ddd
SHA256
8b72a54dd739bea3c83176069d8606f7e739c8c70802d0f224286297285f8734
SHA512
aafadd63c3ac7eb24d17aa73506139343268b32f3095fb6afb88e0d050569b60ba309d354c3de6f323b5f71f3b8b8fee843d0ee44eb14889c9c548305d2f9195
SSDEEP
768:sirM+xMHnDHjhm8b7/sOakY0Dx78l8ZAUfoA:sio+xcDYExLoYoA
Checks for missing Authenticode signature.
resource |
---|
17daa3ef47015911f672b29e15e5c1a0_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
CreateMutexA
GetCurrentProcessId
GetPrivateProfileStringA
GetModuleHandleA
ReadProcessMemory
SetUnhandledExceptionFilter
SetThreadContext
OpenThread
GetProcAddress
DeleteFileA
GetTempPathA
VirtualAlloc
LoadLibraryA
WriteFile
WideCharToMultiByte
MultiByteToWideChar
TerminateProcess
CreateProcessA
ExitProcess
GetLastError
GetCurrentThreadId
GetCurrentProcess
VirtualProtectEx
WriteProcessMemory
GetModuleFileNameA
CreateFileA
SetFilePointer
ReadFile
CloseHandle
Sleep
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
GetCommandLineA
IsBadReadPtr
TerminateThread
GetSystemDirectoryA
CreateThread
CallNextHookEx
UnhookWindowsHookEx
GetWindowThreadProcessId
GetWindowTextA
GetForegroundWindow
SetWindowsHookExA
RegQueryValueExA
RegCloseKey
RegOpenKeyExA
DeleteUrlCacheEntry
InternetReadFile
InternetCloseHandle
PathFileExistsA
URLDownloadToFileA
_initterm
malloc
_adjust_fdiv
_stricmp
_strlwr
_strcmpi
free
strcmp
fopen
fread
fclose
strcat
sprintf
??2@YAPAXI@Z
memcpy
strrchr
memset
strcpy
strlen
atoi
strstr
??3@YAXPAX@Z
strncpy
strchr
fff
ggg
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ