fx
fy
Static task
static1
Behavioral task
behavioral1
Sample
28ee908d60eccecd2d6a24ceed1a1217_JaffaCakes118.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
28ee908d60eccecd2d6a24ceed1a1217_JaffaCakes118.dll
Resource
win10v2004-20240704-en
Target
28ee908d60eccecd2d6a24ceed1a1217_JaffaCakes118
Size
28KB
MD5
28ee908d60eccecd2d6a24ceed1a1217
SHA1
cdadf42e01dcde97e40f34822a81e0307a617a43
SHA256
f2bdf3ba86790afdd3da4cab176126c5643093ce9cca9c91a233a3d4b70340b2
SHA512
4e17733d798ccab7c4dcb177a73a33ab5876bd1e384aa34b1385478068beff35f1b7bc84f3d9404032a6c24847ad351eda66cb5a85460ceef2f6776c7770d765
SSDEEP
768:5wWIv1BsMs+JUuVvQObkBIDRUOE1gllUisKvx5jmuq:5T8yrvOIER6+lDJ
Checks for missing Authenticode signature.
resource |
---|
28ee908d60eccecd2d6a24ceed1a1217_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
CloseHandle
ReadFile
CreateFileA
GetTempPathA
VirtualAlloc
GetPrivateProfileStringA
ExitProcess
VirtualProtect
WriteFile
TerminateProcess
GetCurrentProcess
SetFilePointer
GetModuleFileNameA
GetTickCount
WideCharToMultiByte
LoadLibraryA
DeleteFileA
SetUnhandledExceptionFilter
SetThreadContext
OpenThread
MultiByteToWideChar
CreateProcessA
GetSystemDirectoryA
GetCurrentThreadId
WriteProcessMemory
GetModuleHandleA
GetProcAddress
GetCurrentProcessId
CreateMutexA
GetLastError
Sleep
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
GetCommandLineA
IsBadReadPtr
TerminateThread
ReadProcessMemory
CreateThread
CallNextHookEx
GetClassNameA
GetWindowThreadProcessId
UnhookWindowsHookEx
SetWindowsHookExA
GetWindowTextA
GetForegroundWindow
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
InternetReadFile
InternetCloseHandle
PathFileExistsA
strncpy
strchr
fclose
fread
fopen
_strlwr
_strcmpi
_strupr
_stricmp
??3@YAXPAX@Z
atoi
strstr
strcmp
srand
??2@YAPAXI@Z
memcpy
strrchr
memset
strcat
sprintf
strcpy
strlen
rand
fx
fy
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ