a
b
c
Static task
static1
Behavioral task
behavioral1
Sample
14d0b62585b071bc510e586127ea5f2f_JaffaCakes118.dll
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
14d0b62585b071bc510e586127ea5f2f_JaffaCakes118.dll
Resource
win10v2004-20240508-en
Target
14d0b62585b071bc510e586127ea5f2f_JaffaCakes118
Size
17KB
MD5
14d0b62585b071bc510e586127ea5f2f
SHA1
1de0b068048a0220f655c89707b585623471f3ab
SHA256
c0b3c9835b7cd937b5cfce3a7487e85c560c5bf2940f8614d64e01743f8e1c9c
SHA512
c55786f4c64ffbac7e152c89933bf5f03b59285a8c9f94aa263e4cc4a5940d03121dccd0fb6174eb0973e58f81cd51fe29ff87915630a607926e5e08c5dd9e9b
SSDEEP
384:JDSa5mxsM0S2LVbK1x6dbtFKHymZW/mte31BdFUOllUvjA:5SaxM0SEhKL6a/k1BdywlULA
Checks for missing Authenticode signature.
resource |
---|
14d0b62585b071bc510e586127ea5f2f_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
ReadFile
lstrcatA
MultiByteToWideChar
GetProcAddress
GlobalFree
GetTempFileNameA
GetModuleFileNameA
GetModuleHandleA
CloseHandle
GetTempPathA
lstrcpyA
CreateEventA
RtlUnwind
GlobalAlloc
WriteFile
GetProcessHeap
GetTickCount
HeapFree
HeapAlloc
lstrlenA
GetThreadLocale
GetSystemDefaultLCID
GetUserDefaultLCID
lstrcpynA
SetFilePointer
HeapReAlloc
lstrcmpA
CreateFileA
InterlockedExchange
GetLastError
VirtualQuery
SetDlgItemTextA
CallWindowProcA
EnableWindow
SetWindowTextA
IsWindowVisible
DestroyWindow
GetWindowRect
GetFocus
wsprintfA
GetClientRect
SendMessageA
RegisterWindowMessageA
SetWindowLongA
MessageBoxA
GetWindowLongA
AnyPopup
GetKeyboardLayoutList
CharLowerBuffA
GetDlgItem
ShowWindow
CreateWindowExW
RegOpenKeyExA
RegCloseKey
RegOpenKeyA
RegQueryValueExA
RegSetValueExA
InternetSetFilePointer
HttpOpenRequestA
InternetConnectA
FindCloseUrlCache
InternetOpenA
InternetCloseHandle
GetFileVersionInfoSizeA
a
b
c
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ