ServiceMain
ServiceMainManual
Static task
static1
Behavioral task
behavioral1
Sample
34f1eea1d8124ddd93ed85b4948345d7_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
34f1eea1d8124ddd93ed85b4948345d7_JaffaCakes118.dll
Resource
win10v2004-20240709-en
Target
34f1eea1d8124ddd93ed85b4948345d7_JaffaCakes118
Size
247KB
MD5
34f1eea1d8124ddd93ed85b4948345d7
SHA1
ec4b52e2d39aeddf626d1a68484010484d00ae7a
SHA256
dc104c0ceb8d73157cca35a830f7503d9d54284649f399858021c894c74de7bb
SHA512
c4ede777c18e4cac690e19714b5ec9ff10b90869870da4ba7720c95b26f8b56a062aac244c7a8b190b6ba01ff3bd0f4e9f6771bec62cfd08af1624aaeb7633a2
SSDEEP
6144:GJNr+9Tnh8iWYTGjQcJaMa1PYQdFOXB7Cho8V:2r+9DFNTGUX1AdB7K7
Checks for missing Authenticode signature.
resource |
---|
34f1eea1d8124ddd93ed85b4948345d7_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
DeleteCriticalSection
GetModuleHandleA
GetProcAddress
VirtualProtect
GetKeyboardType
RegQueryValueExA
SysFreeString
VerQueryValueA
StretchBlt
CoTaskMemFree
WSACleanup
InternetReadFile
ExtractIconA
capCreateCaptureWindowA
waveOutWrite
acmStreamUnprepareHeader
GetSaveFileNameA
ServiceMain
ServiceMainManual
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ