bbb
ccc
Static task
static1
Behavioral task
behavioral1
Sample
27a9f5a58de926778eafe0237e902a6f_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
27a9f5a58de926778eafe0237e902a6f_JaffaCakes118.dll
Resource
win10v2004-20240704-en
Target
27a9f5a58de926778eafe0237e902a6f_JaffaCakes118
Size
28KB
MD5
27a9f5a58de926778eafe0237e902a6f
SHA1
1289c4412d24fb768ef6115c3c879a5bfa1b6536
SHA256
a0a605e200be8715fff6c35811ede894fe6b5e904442685097390ef5875a6f5e
SHA512
05cab86b5bf0a114be6a60910c638aff03d061ecc7dac6c54aa9ca54edb756920990a439de4710ca6f56665715f5dc58e323436dda606c4f94982f27c95dce63
SSDEEP
384:oCbLYhQKpnI4BdTZfAymlMzlMWxASx+K8H5od5fnCokBPlTqjCWzqKGpJBpolhUp:Zb0OKu4jlfnMW6SwbqlCo4U+KGD7Wo5
Checks for missing Authenticode signature.
resource |
---|
27a9f5a58de926778eafe0237e902a6f_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetLastError
CreateMutexA
GetCurrentProcessId
ExitProcess
ResumeThread
WriteProcessMemory
VirtualProtectEx
OpenProcess
GetModuleFileNameA
GetProcAddress
ReadProcessMemory
GetModuleHandleA
GetPrivateProfileStringA
DeleteFileA
ReadFile
GetTempPathA
VirtualAlloc
WideCharToMultiByte
MultiByteToWideChar
GlobalAlloc
LoadLibraryA
GetSystemDirectoryA
GetTickCount
RaiseException
GetLocalTime
GetCurrentThreadId
SetFilePointer
InitializeCriticalSection
VirtualProtect
LeaveCriticalSection
EnterCriticalSection
Process32First
CreateToolhelp32Snapshot
GlobalLock
GlobalUnlock
GlobalFree
GetCommandLineA
IsBadReadPtr
TerminateThread
CreateThread
CreateFileA
WriteFile
CloseHandle
Sleep
GetCurrentProcess
CreateProcessA
TerminateProcess
CallNextHookEx
UnhookWindowsHookEx
GetWindowTextA
SetWindowsHookExA
FindWindowA
GetForegroundWindow
GetWindowThreadProcessId
ImageLoad
ImageUnload
PathFileExistsA
rand
srand
atol
wcslen
_strcmpi
_strupr
_strlwr
_stricmp
strcmp
fopen
fread
fclose
strstr
strchr
strcpy
sprintf
strlen
memcpy
??2@YAPAXI@Z
strrchr
memset
strcat
??3@YAXPAX@Z
strncpy
bbb
ccc
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ