a
b
Static task
static1
Behavioral task
behavioral1
Sample
26222015cae50b2cddcd97b4bffe8bb9_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
26222015cae50b2cddcd97b4bffe8bb9_JaffaCakes118.dll
Resource
win10v2004-20240704-en
Target
26222015cae50b2cddcd97b4bffe8bb9_JaffaCakes118
Size
99KB
MD5
26222015cae50b2cddcd97b4bffe8bb9
SHA1
5f908ef63ee785a1ab15d495d7253cf4997d1fb6
SHA256
210ac45a06bd582ad476dd75f7aac5c74d0c4c437c292c536288236fce8d9e60
SHA512
535286b117d4d6dbc53a9e8f975a8e3255967ac34b0a3654a5c32537a3a6ab10049df7f84534d0242ca781938098c3024e57b568bcb148447576874f4fc0b223
SSDEEP
768:hFBAkovxz4Fdzngsu+bh49hO8D1e9wFH0RgpVR8C5Rd5WVf9YHzHW5EJUawOQxEf:hGz4FKOA1PGS7WCh5iOWSatOeEf
Checks for missing Authenticode signature.
resource |
---|
26222015cae50b2cddcd97b4bffe8bb9_JaffaCakes118 |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PathFileExistsA
StrStrIW
SetEvent
WriteFile
OpenProcess
GetVolumeInformationA
Sleep
SizeofResource
CreateEventA
GetSystemDirectoryA
CreateFileW
GetLastError
DisableThreadLibraryCalls
LoadResource
CreateFileMappingA
MoveFileA
LockResource
Process32NextW
CreateMutexA
CreateToolhelp32Snapshot
CloseHandle
GetWindowsDirectoryW
HeapSize
FindResourceW
UnmapViewOfFile
MapViewOfFile
Process32FirstW
TlsGetValue
RtlUnwind
InitializeCriticalSectionAndSpinCount
GetCurrentThreadId
GetCommandLineA
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
GetModuleHandleW
GetProcAddress
TlsAlloc
TlsSetValue
TlsFree
SetLastError
LCMapStringA
WideCharToMultiByte
MultiByteToWideChar
LCMapStringW
HeapFree
ExitProcess
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
HeapCreate
HeapDestroy
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetStringTypeA
GetStringTypeW
LeaveCriticalSection
EnterCriticalSection
GetLocaleInfoA
HeapAlloc
VirtualAlloc
HeapReAlloc
LoadLibraryA
CharLowerA
wsprintfA
ImpersonateLoggedOnUser
RegCreateKeyExA
CreateProcessAsUserW
RegQueryValueExA
OpenProcessToken
RegCloseKey
ShellExecuteW
a
b
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ