DllMain
fltInfo
fltLoad
fltSave
Static task
static1
Behavioral task
behavioral1
Sample
2219d2965b61cc3bff2b54dd37b4d733_JaffaCakes118.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2219d2965b61cc3bff2b54dd37b4d733_JaffaCakes118.dll
Resource
win10v2004-20240611-en
Target
2219d2965b61cc3bff2b54dd37b4d733_JaffaCakes118
Size
145KB
MD5
2219d2965b61cc3bff2b54dd37b4d733
SHA1
91b6adba789802bcc96c0081ab5f6c00a1131532
SHA256
dc5cb1b4a900b80dd23c29fa756ef13c5b240fe3a78bc186dd029ce55257a41e
SHA512
45f78ff0a915c02d3fc1c6609caa68ba07e48d9921701e3fbdfc6a6f08729ae4a7fa77e5431a4a96365f61c7e65f827acddc3060ff2788d30705ef7d9ce4f1d3
SSDEEP
3072:Qp64FafowZCZmAW+edJJde7wht3+NII0q+rsss1ZKbLDFmjQIy:KNcfuPNedTdQAONII0qnSLDAjQB
Checks for missing Authenticode signature.
resource |
---|
2219d2965b61cc3bff2b54dd37b4d733_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
lstrcpyA
SetStdHandle
CloseHandle
FlushFileBuffers
LoadLibraryA
VirtualAlloc
HeapFree
HeapAlloc
GetCommandLineA
GetProcAddress
GetModuleHandleA
GetVersion
ExitProcess
TerminateProcess
GetCurrentProcess
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
GetLastError
HeapDestroy
HeapCreate
VirtualFree
SetHandleCount
GetFileType
GetStdHandle
GetStartupInfoA
DeleteCriticalSection
GetModuleFileNameA
GetCPInfo
GetACP
GetOEMCP
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
WideCharToMultiByte
WriteFile
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
SetFilePointer
ord312
ord191
ord190
ord189
ord282
ord192
ord283
ord188
DllMain
fltInfo
fltLoad
fltSave
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE