fa
fc
Static task
static1
Behavioral task
behavioral1
Sample
16cc36adccc0408ca1eb3aa3bc6665b4_JaffaCakes118.dll
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
16cc36adccc0408ca1eb3aa3bc6665b4_JaffaCakes118.dll
Resource
win10v2004-20240611-en
Target
16cc36adccc0408ca1eb3aa3bc6665b4_JaffaCakes118
Size
16KB
MD5
16cc36adccc0408ca1eb3aa3bc6665b4
SHA1
714951bd0741592eb8448a494ca6d1b2fe3a79f5
SHA256
7baeb9bfb1068f93623721604fd6e164874ddef229cde095b05241ff16ec75be
SHA512
64fbf2bbc39fcf9b69a9711f957277ebf535a66c3fbbfd208c36c0b0ccdf020a091a3d6ab10c466109218965acc290b30a884b5e8fa80a38a55d6cfcfd9cca8c
SSDEEP
384:PzCPJrMucc4dSDPqK8Z3X+hBt2vY1Z3j:GP1YSDPqK85X+td15
Checks for missing Authenticode signature.
resource |
---|
16cc36adccc0408ca1eb3aa3bc6665b4_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetModuleFileNameA
Sleep
GetCommandLineA
GlobalFree
GetModuleHandleA
GetCurrentProcess
GlobalLock
GlobalAlloc
GetPrivateProfileStringA
GetProcAddress
IsBadReadPtr
VirtualProtectEx
CreateThread
ReadProcessMemory
SetWindowsHookExA
GetAsyncKeyState
ToAscii
CallNextHookEx
GetKeyboardState
InternetCloseHandle
InternetOpenUrlA
InternetOpenA
InternetReadFile
strcat
_adjust_fdiv
malloc
_initterm
free
memset
strlen
strstr
memcpy
strrchr
strcpy
strcmp
_stricmp
sprintf
??2@YAPAXI@Z
strncpy
fa
fc
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ