CancelDll
LoadDll
Static task
static1
Behavioral task
behavioral1
Sample
340c384a08e4e9ada902d7de9a1e77d5_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
340c384a08e4e9ada902d7de9a1e77d5_JaffaCakes118.dll
Resource
win10v2004-20240709-en
Target
340c384a08e4e9ada902d7de9a1e77d5_JaffaCakes118
Size
110KB
MD5
340c384a08e4e9ada902d7de9a1e77d5
SHA1
56f9331ca52d59732af1cd94eba58490577f7620
SHA256
1bf8a7a2f55b7d4656d1f4656fbf116606504604f39c32070a3371e62567475e
SHA512
8fa21d1f8617ed53656092b5931ddd1fde32fe72eb74781f8631bbdd0e170ffa69689b2b54e9908d768045a133fd94eeca7be667af4b9aba14f85c2203ae4150
SSDEEP
1536:tIBrqlUXG1+dLuOtecgcfw3g074/ncK0bOQ1ckWDUMUqMv22itypi5/Yls3TfSB:GBkUW1+5Ecf+gXb0bL1JWoMFbyPlAaB
Checks for missing Authenticode signature.
resource |
---|
340c384a08e4e9ada902d7de9a1e77d5_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
_vsnprintf
tolower
_except_handler3
_stricmp
malloc
printf
exit
wcsstr
wcscpy
wcsncat
wcslen
time
srand
rand
mbstowcs
fopen
fseek
ftell
fclose
wcscmp
free
sprintf
strcpy
strrchr
strcat
strchr
memset
strncpy
strstr
strlen
atoi
__CxxFrameHandler
??2@YAPAXI@Z
??3@YAXPAX@Z
memcpy
_strcmpi
_strupr
GetDeviceCaps
CreateCompatibleDC
CreateCompatibleBitmap
SelectObject
BitBlt
DeleteObject
DeleteDC
CreateDCA
SetThreadContext
Thread32Next
EnterCriticalSection
LeaveCriticalSection
VirtualProtect
FlushInstructionCache
InitializeCriticalSection
AddVectoredExceptionHandler
GetModuleHandleA
SetFilePointer
CreateFileA
GetFileSize
ReadFile
GetThreadContext
VirtualQueryEx
ReadProcessMemory
GetFileAttributesW
CloseHandle
GetTempPathA
GetProcAddress
FreeLibrary
IsBadReadPtr
GetCurrentProcessId
OpenProcess
TerminateProcess
GetCurrentProcess
DeleteFileA
OpenThread
Thread32First
CreateToolhelp32Snapshot
MultiByteToWideChar
lstrlenA
WideCharToMultiByte
FindFirstFileA
HeapAlloc
GetProcessHeap
Sleep
GetCommandLineA
LoadLibraryA
FindClose
FindNextFileA
GetModuleFileNameA
GetWindowRect
GetWindow
GetClassNameW
CallNextHookEx
SetWindowsHookExA
UnhookWindowsHookEx
wsprintfA
GetDC
CancelDll
LoadDll
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE