??0CInjector@@QAE@XZ
??4CInjector@@QAEAAV0@ABV0@@Z
?fnInjector@@YAHXZ
?nInjector@@3HA
Static task
static1
Behavioral task
behavioral1
Sample
33146333501d822e089eaaad9c2e7617_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
33146333501d822e089eaaad9c2e7617_JaffaCakes118.dll
Resource
win10v2004-20240709-en
Target
33146333501d822e089eaaad9c2e7617_JaffaCakes118
Size
22KB
MD5
33146333501d822e089eaaad9c2e7617
SHA1
61235824522d66b33e3df782bc0ad164abbb5233
SHA256
5688c2e01745f3ff248524ee1abd1d3d4ab6b868b64327a7828eeb3a9bb571ad
SHA512
8822efea37fc242c1e0358a89eee3be188bfce9bdcf1cc2e2bc04fbe4cdc5ecbe744ae53f94efe5628a1a0f1dff823c4c310f4d07ad20b95bc02de25ccbe017c
SSDEEP
384:0OIifZFIkHpcTncpymlot3yJDa+NqtusIAcjoujt9+l+To:LF1JcTnAS3WDa+NqtxI7joMtS
Checks for missing Authenticode signature.
resource |
---|
33146333501d822e089eaaad9c2e7617_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
LoadLibraryA
GetModuleFileNameA
InterlockedDecrement
InterlockedIncrement
GetCommandLineA
GetVersion
HeapFree
HeapAlloc
WideCharToMultiByte
MultiByteToWideChar
LCMapStringA
LCMapStringW
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
ExitProcess
TerminateProcess
GetCurrentProcess
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
TlsGetValue
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
HeapDestroy
HeapCreate
VirtualFree
WriteFile
VirtualAlloc
HeapReAlloc
RtlUnwind
GetCPInfo
GetACP
GetOEMCP
GetProcAddress
GetStringTypeA
GetStringTypeW
??0CInjector@@QAE@XZ
??4CInjector@@QAEAAV0@ABV0@@Z
?fnInjector@@YAHXZ
?nInjector@@3HA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE