WHInit
WHUninit
Static task
static1
Behavioral task
behavioral1
Sample
2def090bd4b93d9771e02b356e5478d0_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2def090bd4b93d9771e02b356e5478d0_JaffaCakes118.dll
Resource
win10v2004-20240704-en
Target
2def090bd4b93d9771e02b356e5478d0_JaffaCakes118
Size
108KB
MD5
2def090bd4b93d9771e02b356e5478d0
SHA1
0e5270ad2158c96824eae77459422a6122a6117c
SHA256
ec63bdb07c21393fcd14dc30ac8135e4eaa89a4db370aa6beab86b3f8f1a87ea
SHA512
9aeda1d88fd1f209f78a45dcc81d141532a855f8c9d3b344e43598e4ff4e84a662b744b9dce7c7f695afa5f5c9fdad85f7d1b543102b77d505ebfdfc04e60fd6
SSDEEP
1536:+GuY67RazF54TkhhMeNVmNocfflO+mNuLmQpYsXna:+Gq7s55czeq1CRQpYQa
Checks for missing Authenticode signature.
resource |
---|
2def090bd4b93d9771e02b356e5478d0_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
EnumProcesses
GetModuleBaseNameA
RpcStringFreeA
UuidToStringA
UuidCreate
CreateProcessA
FreeEnvironmentStringsA
lstrcpyA
lstrlenA
GetEnvironmentStrings
lstrcmpA
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
FreeLibrary
GetProcAddress
LoadLibraryA
CloseHandle
GetCurrentProcess
OpenMutexA
GetLastError
CreateMutexA
WaitForSingleObject
ReleaseMutex
LocalFree
OpenProcess
Module32Next
Module32First
CreateToolhelp32Snapshot
CreateThread
GetModuleFileNameA
UnmapViewOfFile
MultiByteToWideChar
OpenFileMappingA
CreateFileMappingA
GetEnvironmentVariableA
TerminateProcess
WideCharToMultiByte
lstrlenW
LCMapStringA
GetStringTypeW
GetStringTypeA
GetOEMCP
GetCPInfo
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetStartupInfoA
GetFileType
SetHandleCount
LCMapStringW
InterlockedDecrement
MapViewOfFile
SetLastError
HeapSize
InterlockedIncrement
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetStdHandle
WriteFile
InterlockedExchange
GetACP
GetLocaleInfoA
GetThreadLocale
GetVersionExA
HeapAlloc
HeapFree
RaiseException
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
VirtualProtect
VirtualAlloc
GetModuleHandleA
GetSystemInfo
VirtualQuery
RtlUnwind
GetCurrentThreadId
GetCommandLineA
GetProcessHeap
VirtualFree
HeapReAlloc
HeapDestroy
HeapCreate
ExitProcess
Sleep
CallNextHookEx
SetWindowPos
RegisterWindowMessageA
SendMessageTimeoutA
GetSystemMetrics
GetParent
SetPropA
GetPropA
SetWindowsHookExA
SetWindowLongA
UnhookWindowsHookEx
DispatchMessageA
TranslateMessage
SetTimer
KillTimer
PostThreadMessageA
GetAncestor
GetClassNameA
wsprintfA
CallWindowProcA
GetMessageA
RegOpenKeyExA
RegCloseKey
ConvertStringSecurityDescriptorToSecurityDescriptorA
RegQueryValueExA
CoCreateInstance
VarCmp
SysAllocString
SysAllocStringLen
VariantClear
VariantInit
SysFreeString
WHInit
WHUninit
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ