fx
fy
Static task
static1
Behavioral task
behavioral1
Sample
2e335dd2016dc924ab1f8dbd473c308d_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2e335dd2016dc924ab1f8dbd473c308d_JaffaCakes118.dll
Resource
win10v2004-20240704-en
Target
2e335dd2016dc924ab1f8dbd473c308d_JaffaCakes118
Size
29KB
MD5
2e335dd2016dc924ab1f8dbd473c308d
SHA1
4d5683a6111d50f2bfac277a7331388f70c96ae1
SHA256
a0a6a6fbcbe0fbd189d3a5e67ce7a1673e759a297237b99e4dce8beb9c2df35e
SHA512
b13b7a66468ea47c25f82a268952d80b64c23bf161aa8c0ad2946d91add0eb584a8dfdd8067990ff6f85684b2f4f705c63173966e279aaec114f64d90f2ac25d
SSDEEP
384:9qvGfgK2X8ocV/l28tJceXB9w4kE15yFahbDku4ZXWB4QazBxRpT2cWEtqWPsO1G:egF+olJtGeX8wa4bDku14QLEtXD1q3dT
Checks for missing Authenticode signature.
resource |
---|
2e335dd2016dc924ab1f8dbd473c308d_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetTempPathA
VirtualAlloc
GetCommandLineA
WriteFile
IsBadReadPtr
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
SetFilePointer
GetModuleFileNameA
ExitProcess
InitializeCriticalSection
VirtualProtectEx
VirtualProtect
GetPrivateProfileStringA
WideCharToMultiByte
LeaveCriticalSection
EnterCriticalSection
LoadLibraryA
CreateFileA
SetUnhandledExceptionFilter
SetThreadContext
OpenThread
MultiByteToWideChar
TerminateProcess
CreateProcessA
GetSystemDirectoryA
GetCurrentThreadId
GetCurrentProcess
WriteProcessMemory
ReadFile
CloseHandle
GetLocalTime
DeleteFileA
Sleep
GetModuleHandleA
GetProcAddress
VirtualAllocEx
TerminateThread
CreateThread
GetCurrentProcessId
CreateMutexA
ReadProcessMemory
GetLastError
FindWindowA
CallNextHookEx
GetAsyncKeyState
UnhookWindowsHookEx
SetWindowsHookExA
GetForegroundWindow
GetWindowTextA
GetWindowThreadProcessId
ToAscii
InternetCloseHandle
InternetReadFile
strchr
fclose
fread
fopen
_strcmpi
_stricmp
_strupr
_strlwr
??3@YAXPAX@Z
atoi
strrchr
wcslen
strcat
sprintf
strcpy
strlen
strncpy
strstr
strcmp
??2@YAPAXI@Z
memcpy
memset
fx
fy
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ