RMACreateInstance
RMAShutdown
SetDLLAccessPath
Static task
static1
Behavioral task
behavioral1
Sample
1b5ab9234d9aaafa0177603fd3a2fc1c_JaffaCakes118.dll
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
1b5ab9234d9aaafa0177603fd3a2fc1c_JaffaCakes118.dll
Resource
win10v2004-20240611-en
Target
1b5ab9234d9aaafa0177603fd3a2fc1c_JaffaCakes118
Size
204KB
MD5
1b5ab9234d9aaafa0177603fd3a2fc1c
SHA1
cc845969026f865ddc946c9856e4aa2dac462b10
SHA256
403e6488558495da59809311f7301ba702adc8f25a581ff279f56d9d62e8ac53
SHA512
7c343c8fb5f47e94c94bafcee64d2a73ea92e4ae522dc27b15a720d7e34ee73340b3b5819287a7f2a6c7a109a72a6605e32f1de4334983e54018829bbac72af9
SSDEEP
3072:4WqHHz1kO1izYjTQzG8kDgFmzDMOzjNTdpYKvAibqzdWPEAKkiSW:yHTf1izCTQiZDamzYODpP4ib2BB
Checks for missing Authenticode signature.
resource |
---|
1b5ab9234d9aaafa0177603fd3a2fc1c_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
realloc
malloc
free
__dllonexit
_onexit
??3@YAXPAX@Z
_adjust_fdiv
rand
_purecall
??2@YAPAXI@Z
memmove
strchr
_initterm
_stricmp
_putenv
GetCurrentProcessId
InterlockedIncrement
InterlockedDecrement
InitializeCriticalSection
EnterCriticalSection
GetCurrentThreadId
LeaveCriticalSection
DeleteCriticalSection
SendMessageTimeoutA
CallNextHookEx
UnhookWindowsHookEx
GetSystemMetrics
CharNextA
SetWindowsHookExA
RMACreateInstance
RMAShutdown
SetDLLAccessPath
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ