kkk
lll
Static task
static1
Behavioral task
behavioral1
Sample
2cdc38611be42d4cab9982e419533b60_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2cdc38611be42d4cab9982e419533b60_JaffaCakes118.dll
Resource
win10v2004-20240704-en
Target
2cdc38611be42d4cab9982e419533b60_JaffaCakes118
Size
28KB
MD5
2cdc38611be42d4cab9982e419533b60
SHA1
7897b9eb294bfe04406894bd80a655c62e23b56c
SHA256
b4b0f96edb9c93c92f76aac579e412943e30ac32f7c86ae58746be88e0bc86a1
SHA512
eea62a63d924a01c09791fae713ad4a42ae9190378adff7f5c6a0ba315f777cf64e92f46c720dd7a59a4835ffcedf9557521354bcae9a5bfa83f2afd9a4460b2
SSDEEP
384:WovYe4PHhq9iB5AVYZlB7FBJFeMdGDYgKHQXRv25tNDVcW6GSNbWlZEiVde:WovYe+HnBeYB71FRcDukR+v3n6xAdve
Checks for missing Authenticode signature.
resource |
---|
2cdc38611be42d4cab9982e419533b60_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetLastError
CreateMutexA
GetCurrentProcessId
CreateThread
GetProcAddress
VirtualAlloc
ReadProcessMemory
GlobalLock
GlobalAlloc
CreateProcessA
GetModuleFileNameA
GetPrivateProfileStringA
WideCharToMultiByte
MultiByteToWideChar
GlobalFree
GlobalUnlock
IsBadReadPtr
SetFilePointer
ExitProcess
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
LoadLibraryA
SetThreadContext
OpenThread
SetUnhandledExceptionFilter
GetCommandLineA
GetCurrentThreadId
WriteProcessMemory
ReadFile
DeleteFileA
GetTempPathA
CreateFileA
WriteFile
CloseHandle
VirtualProtect
GetModuleHandleA
GetCurrentProcess
TerminateProcess
TerminateThread
VirtualProtectEx
Sleep
GetWindowThreadProcessId
FindWindowA
CallNextHookEx
UnhookWindowsHookEx
SetWindowsHookExA
GetForegroundWindow
GetWindowTextA
InternetCloseHandle
InternetReadFile
wcslen
strrchr
_strupr
_stricmp
_strcmpi
_strlwr
strcmp
fopen
fread
fclose
strcpy
sprintf
strlen
memcpy
strcat
memset
??2@YAPAXI@Z
atoi
??3@YAXPAX@Z
strstr
strncpy
strchr
kkk
lll
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ